IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO White Papers (View All Report Types)
51 - 75 of 2571 Matches Previous Page  |  Next Page
4 Steps to Meet Growing IT Demands
sponsored by Rackspace
WHITE PAPER: In this informative resource, gain critical insights into a new "service broker" model of IT operations that can provide end users with faster service, enable IT teams to undertake more strategic projects, and allow management to see more clearly IT's business contributions.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Rackspace

5 Common Stages of Enterprise Endpoint Backup Grief
sponsored by Code42
WHITE PAPER: This informative white paper discusses the five common stages of enterprise endpoint backup grief, detailing the common mistakes that organizations make while trying to deal with data loss and leakage. Read on and learn how you can skip these stages and adopt an effective solution.
Posted: 07 Aug 2013 | Published: 07 Aug 2013

Code42

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015

SecureAuth

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

5 Keys to Unlock an Easy Network Access Control Implementation
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll discover the 5 keys to unlocking easier NAC implementation.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

5 Proven Ways to Motivate and Retain your Technology Team
sponsored by Pluralsight
WHITE PAPER: Building a work environment that fosters loyalty and growth is your first step towards retaining your tech staff. This white paper highlights 5 key areas that you need to pay attention to in order to retain your employees and make sure they don't seek out greener pastures.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Pluralsight

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain
sponsored by SurfWatch Labs
WHITE PAPER: The following white paper explores the most common challenges associated with backdoor security in the midst of the data explosion and provides readers with the top 5 tips on how to secure small business backdoors within the supply chain.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SurfWatch Labs

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

451 Group Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This report analyzes where AlienVault fits into the SMB security market. Read on for descriptions of products that AlienVault offers and considerations surrounding the main strengths, weaknesses, opportunities and threats facing the organization in relation to its competitors.
Posted: 05 May 2014 | Published: 26 Mar 2014

AlienVault

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

4G: The What, Why and When
sponsored by Tellabs
WHITE PAPER: The purpose of this paper is to: Clarify the definition of 4G from a technology perspective; present business benefits of 4G-enabled services; and Propose a realistic timeline for the adoption of a 4G standard.
Posted: 23 Oct 2008 | Published: 23 Oct 2008

Tellabs

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Cloud Security Concerns You Must Address
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett-Packard Company

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett-Packard Company
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett-Packard Company

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation
51 - 75 of 2571 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement