IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
1 - 25 of 4474 Matches Previous Page  | Next Page
10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

10 Sins of an Enterprise Backup & Recovery
sponsored by Asigra
WHITE PAPER: This exclusive resource examines ten common enterprise backup and recovery problems that organizations today face, and discusses the steps you can take to ensure that if and when disaster strikes, the correct data can be efficiently restored with minimum disruption.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Asigra

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 15 Jan 2014 | Published: 15 Jan 2014

F5 Networks

10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization.
Posted: 24 Dec 2013 | Published: 19 Aug 2013

Palo Alto Networks

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: This exclusive whitepaper offers up 10 tips for improving your incident response capabilities.
Posted: 14 Nov 2014 | Published: 14 Nov 2013

Dell SecureWorks

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

10 Ways to Can Simplify Your IT Environment & Save Time
sponsored by ExtraHop
WHITE PAPER: Wire data is the record of everything that is happening in your IT environment in real time, but it's historically been untapped. This white paper highlights 10 ways wire data can help you conquer IT complexity.
Posted: 15 Sep 2014 | Published: 30 Nov 2013

ExtraHop

10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

SIOS Technology Corp

  Delivering Comprehensive Business Monitoring and Protection
sponsored by ArcSight, an HP Company
WHITE PAPER: ArcSight ESM is a sophisticated solution for compliance requirements and protection against external and internal security breaches. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company

10 Best Practices for Microsoft SharePoint Security
sponsored by Thawte Inc.
WHITE PAPER: In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

Thawte Inc.

10 Building Blocks for Securing File Data
sponsored by Imperva
WHITE PAPER: This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.
Posted: 11 Mar 2011 | Published: 10 Mar 2011

Imperva

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions
sponsored by netForensics
WHITE PAPER: This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

netForensics

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Questions to Ask Before You Buy an Anti‐Spam Solution
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough
sponsored by eIQnetworks
WHITE PAPER: "Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

eIQnetworks

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Steps to Establishing an Effective Email Retention Policy
sponsored by CA Technologies.
WHITE PAPER: Building a well-planned, enterprise-wide email retention policy helps establish uniform and consistent rules for all email and electronic records.
Posted: 23 Jan 2009 | Published: 23 Jan 2009

CA Technologies.

10 Things IT Should Be Doing (but isn't)
sponsored by Varonis
WHITE PAPER: Check out this brief paper to learn the ten must-do actions for maximizing unstructured data protection.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited
1 - 25 of 4474 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement