IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Single Sign On

RSS Feed    Add to Google    Add to My Yahoo!
Single Sign On Multimedia (View All Report Types)
 
Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST: Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)

Microsoft & Quest Software

Cloud Access 360 Overview Video
sponsored by Intel
VIDEO: Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.
Posted: 29 Mar 2011 | Premiered: 29 Mar 2011

Intel

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Battling Advanced Persistent Threats
sponsored by Threat Track Security
WEBCAST: In this webcast, discover exactly what you can do to implement more proactive security suitable for fighting advanced persistent threats.
Posted: 04 Jun 2015 | Premiered: Jun 4, 2015

Threat Track Security

DNS is the Next Security Battlefield
sponsored by Cloudmark
WEBCAST: In this webcast, you will learn the security vulnerabilities of DNS and why you can't assume that it's protected.
Posted: 10 Jun 2015 | Premiered: Jun 5, 2015

Cloudmark

Comprehensive Virtualization Administration in One Place
sponsored by Tintri
WEBCAST: This video explores the features of an administrative portal for virtual environments to help you discover what tools you need to better administer your own.
Posted: 29 Jun 2015 | Premiered: Jun 29, 2015

Tintri

Edge for the Mobile End User
sponsored by Unisys
VIDEO: This video features a service management solution that allows your mobile users to quickly and easily manage their service needs on the go—from any location and on any device.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement