IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on White Papers (View All Report Types)
 
Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper helps you understand how a malware attack works by getting you inside the mind of a hacker.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

IBM Cognos Disclosure Management on Cloud
sponsored by IBM
WHITE PAPER: This white paper introduces IBM Cognos Disclosure Management on Cloud, a cloud-based platform designed to meet all of your organization's needs for the production of recurring, multi-author reports.
Posted: 26 Feb 2015 | Published: 30 Jan 2015

IBM

Desktop-as-a-Service Gaining Ground: 2014 Survey Results
sponsored by NaviSite
WHITE PAPER: Access this white paper to explore the reasons to reconsider Desktop-as-a-Service (DaaS) and examine how DaaS desktops remove much of the cost and complexity of traditional desktop computing. You'll also learn the top reasons to migrate to a DaaS or VDI environment center around data security and BYOD.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

NaviSite

Best Practices for Creating the Network-Enabled Cloud
sponsored by XO Communications
WHITE PAPER: Access this white paper to discover a step-by-step guide to help improve your network to handle services delivered from multiple clouds.
Posted: 02 Mar 2015 | Published: 31 Dec 2014

XO Communications

HP Service Manager and HP uCMDB Plug-in for VMware vRealize Orchestrator
sponsored by Avnet
WHITE PAPER: This resource examines explores a new way to bridge the gap between your VMware-based virtualization layer and IT Service Management by enabling enterprise operational process automation to improve process efficiency and reduce manual labor.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Avnet

Mitigating Risk with Security Intelligence and Identity Assurance
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an integrative approach that lets companies quickly identify abnormalities in user behavior, as well as fighting insider threats all while complying with regulations.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Old Techniques in a New Channel: The Evolving Threats of Mobile Banking
sponsored by IBM
WHITE PAPER: This white paper describes in detail the attacks mobile banking users face.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

Delivering user-centric IT solutions that improve workplace productivity
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is an end-to-end solution to enable the journey from a traditional, device-centric landscape to a future-proof, user-centric landscape and allowing organizations to assemble the best-fit working environment and applications for each user on any device they choose.
Posted: 24 Feb 2015 | Published: 31 Dec 2014


The DevOps Mindset: Real-World Insights from Tech Leaders
sponsored by Rackspace
WHITE PAPER: This white paper contains insights from technology leaders on the trials and successes of collaboration between Development and Operations teams, and provides suggestions for companies looking to adopt the DevOps mindset.
Posted: 20 Feb 2015 | Published: 29 Aug 2014

Rackspace

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement