IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO White Papers (View All Report Types)
151 - 175 of 3147 Matches Previous Page  |  Next Page
A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: Network perimeter security isn't good enough anymore. Micro-segmentation allows us to secure the data center from the inside and ensure that breaches are stopped before the can spread. Read on to learn more about a security solution that features micro-segmentation and how it will benefit your organization.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

A New Paradigm in Desktop Virtualization Delivering Rich Graphics Applications to Anyone
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to discover three architectural models for delivering rich graphics to virtual desktop environments. Find out how to deliver accelerated graphics for a variety of users and workloads and the benefits of using VDI for rich graphics.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

A Next-Generation Analytics Platform for Optimizing Critical Application Operations in Virtualized Environments
sponsored by SIOS Technology Corp
WHITE PAPER: This white paper explores a next-generation IT analytics platform that is adaptable and scalable to meet the needs of IT departments in virtual environments. Access now and learn how this platform enables you to consolidate a variety of data sources into a single repository where it can apply advanced analytics.
Posted: 20 Apr 2016 | Published: 31 Dec 2015

SIOS Technology Corp

A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER: This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

A Performance-Centric Approach to Mainframe Cost Optimization
sponsored by Global Technology Solutions Group
WHITE PAPER: When Global Technology Solutions Group, a company who spends a lot of time on the mainframe, was asked how to run it more efficiently from a cost perspective, they responded with their own approach. This white paper takes a brief look at that approach and its three key areas – hardware, software, and personnel.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Global Technology Solutions Group

A Practical Guide to Choosing the Right IT Systems
sponsored by Oracle, in association with Intel
WHITE PAPER: In the following white paper, learn about the importance of choosing the right IT systems. Read on now and learn about the potential downfalls of choosing the inappropriate systems for your niche, where to turn for advice on the right systems, and more.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Oracle, in association with Intel

A Heuristic Approach to Mobile Security
sponsored by Zenprise
WHITE PAPER: This paper addresses the aspects of a new approach to mobile security management that is imperative if we are to keep up with the fast pace of change in mobile user demands and devices.
Posted: 20 Oct 2011 | Published: 20 Oct 2011

Zenprise

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems

A Management Tool that Will Empower you with a Proactive Approach
sponsored by VMware, Inc.
WHITE PAPER: This resource presents the results from a recent study interviewing 200 of your peers on the impact that VMware's vCenter Operations Management Suite had on their business.
Posted: 26 Sep 2013 | Published: 26 Sep 2012

VMware, Inc.

A Manager's Guide To Unified Threat Management And Next-Generation Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization?
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Sophos, Inc.

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

A More Elastic Enterprise Cloud Network
sponsored by Citrix
WHITE PAPER: The best enterprise cloud is elastic. Find out how you can get on-demand scalability and pay-as-you-grow performance.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

TOPICS:  IT Management
Citrix

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by Intel Security
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

Intel Security

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Imprivata

A New Charter for HR
sponsored by Jive Software
WHITE PAPER: In this white paper, Stowe Boyd of GigaOM Research explores:The current state of the workforce: What is the new normal? How HR and technology leaders can work together to responsibly invest in social technologies? What HR must become to embrace the modern workplace and earn a seat at the executive table.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Jive Software

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: DoS attacks have grown, and now they target more businesses than ever. See how you can get a robust, affordable defense.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

TOPICS:  IT Management
Citrix

A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

A Practical Approach to Wireless 2.0
sponsored by Aerohive Networks
WHITE PAPER: Have you ever seen or experienced a Wi-Fi network that was as reliable as a light switch? Me either. That brings me to the point of this whitepaper: Wireless 2.0.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Aerohive Networks

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Fujitsu
151 - 175 of 3147 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement