IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Single Sign On

RSS Feed    Add to Google    Add to My Yahoo!
Single Sign OnWhite Papers (View All Report Types)
 
CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
sponsored by Intel
WHITE PAPER: In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Intel

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Security Assertion Markup Language (SAML) - the Essential Guide
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Ping Identity Corporation

Solution Summary  - Secure Cloud
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Beverly Hills Wealth Management Case Study
sponsored by Intel
WHITE PAPER: Read this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Intel

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Secure Internet Single Sign-On (SSO) 101
sponsored by Ping Identity Corporation
WHITE PAPER: Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.
Posted: 05 Jun 2009 | Published: 08 Jun 2009

Ping Identity Corporation

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement