IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Multimedia (View All Report Types)
 
Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
VIDEO: Access this video for data breach trends and statistics. Watch and learn how to avoid data breaches in the future.
Posted: 22 Jan 2015 | Premiered: 22 Jan 2015

Absolute Software

Balancing Mobile Security with End-User Satisfaction
sponsored by MobileIron
VIDEO: Access this short video to find out how one company can successfully protect your mobile devices and applications, without frustrating your employees.
Posted: 11 Mar 2015 | Premiered: 16 Jun 2014

MobileIron

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Deliver Service Management and Unified Endpoint Management Software from a Single Platform
sponsored by FrontRange Solutions Inc.
VIDEO: This video discusses how IT can deploy service management and unified endpoint management software both on-premise and in the cloud from a single platform, allowing for greater automation and streamlined operations.
Posted: 20 Apr 2015 | Premiered: 13 Nov 2014

FrontRange Solutions Inc.

Bypassing Security Policies using Insufficient Authorization
sponsored by White Hat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 14 Apr 2015 | Premiered: Apr 14, 2015

White Hat Security

Understand the Drivers Behind Hybrid Cloud Adoption
sponsored by Peer1
VIDEO: Tune into this video to discover the biggest drivers behind hybrid cloud adoption.
Posted: 22 May 2015 | Premiered: 22 May 2015

Peer1

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

2015 Cybersecurity Legislation
sponsored by ESET
WEBCAST: This webcast gives you the background you need on proposed cybercrime laws and how they impact you.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement