IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO White Papers (View All Report Types)
26 - 50 of 2729 Matches Previous Page  |  Next Page
15 Top-Paying IT Certifications for 2015
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

2015 Cybersecurity: Attack Resiliency Challenges Industry Collaboration
sponsored by Cisco
WHITE PAPER: This white paper shows you the trends of cybercrime and why their attacks continue to win over businesses trying to keep them out.
Posted: 03 Feb 2016 | Published: 01 Jan 2016

Cisco

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

2015 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Download your copy ofthe eighth annual Global Knowledge IT Skills and Salary Survey to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for, and much more.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Global Knowledge

2016 Annual Security Report
sponsored by Cisco
WHITE PAPER: This security report presents research, insights and perspectives highlighting the challenges that defenders face in blocking attackers.
Posted: 04 Feb 2016 | Published: 01 Feb 2016

Cisco

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Kingpin Communications
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

4 Critical Steps for IT Uptime, Security, and Connectivity
sponsored by CyrusOne
WHITE PAPER: To accommodate customer demands, increasing amounts of data, and changing regulations, your business needs to stay ahead of the curve. This white paper explores how colocation can help you do just that, with high levels of network flexibility and security.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

CyrusOne

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

2013 Impact Awards Reveal Industry Top Players
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

3 Keys to Choosing a Document Management Vendor
sponsored by OnBase by Hyland
WHITE PAPER: In document management, your choice of vendor is everything. Find out the three crucial steps to making the right pick.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale

3 Steps to Building a Successful ECM Project
sponsored by OnBase by Hyland
WHITE PAPER: You have a vision of an ECM project, but how do you get there? Find out the steps, from design to execution.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix
26 - 50 of 2729 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement