IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on White Papers (View All Report Types)
 
Check Point and Silver Peak Securing the Internet for SD-WAN
sponsored by Silver Peak
WHITE PAPER: Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.
Posted: 28 Nov 2017 | Published: 31 Dec 2016

Silver Peak

Anti-Bribery and Corruption Risk Assessment Checklist
sponsored by Navex Global
WHITE PAPER: This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Navex Global

Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud
sponsored by AWS - Fortinet
WHITE PAPER: Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.
Posted: 17 Nov 2017 | Published: 30 Apr 2017

AWS - Fortinet

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Forrester: How To Become A Superstar Security Leader
sponsored by Google Cloud
WHITE PAPER: As an IT leader your fellow executives trust you to protect, support, and drive business performance. However, expectations of IT security have changed with the increase of digital data. Download this Forrester report to read specific examples of how today's top information security professionals are rising to the occasion.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

TOPICS:  IT Management
Google Cloud

Design and deliver cloud-based apps and data for flexible, on-demand IT
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a cloud-based management platform can enable IT to deliver the right set of workspace services for each user—desktops, apps, data sharing and mobility management—into a secure mobile workspace that is accessible on any network from any device.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

5 Ways Virtualization Enhances Security and Productivity
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

Keys to Designing Your Modern Workplace
sponsored by Microsoft
WHITE PAPER: Have you provided your employees with the tools and spaces needed to ensure they're fulfilling their best potential? Find out in this paper, which details how to design dynamic workspaces that tap into your employees' creativity.
Posted: 07 Dec 2017 | Published: 31 Dec 2016

Microsoft

A Practical Guide for GDPR Compliance
sponsored by RSA
WHITE PAPER: According to an Osterman Research report, 64% of organizations are not ready to comply with the GDPR. Grab your copy of this Osterman Research practical guide to understanding your readiness. Don't miss the checklist on page 9.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement