IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
101 - 125 of 5931 Matches Previous Page  |  Next Page
3 Things to Know Before Moving Your Data to the Cloud
sponsored by Veritas
WHITE PAPER: Moving secondary data to the cloud seems simple. Take three steps to prevent a host of negative consequences.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

3 Tips to Consider Before Signing a Public Cloud Contract
sponsored by Veritas
WHITE PAPER: Be sure to understand three key points about how your public cloud provider will handle your data and your relationship.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

3 Types of Insider Threats to Watch Out For
sponsored by Absolute
WHITE PAPER: Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Absolute

3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

4 Reasons You Need a High Performance ADC
sponsored by A10 Networks
WHITE PAPER: With more devices and connections to always-on access, internet attacks are continuing to grow at a tremendous rate. How can you improve performance, connectivity, and above all, security? This resource details how ADC's can safeguard your network, your users and your data from emerging threats and attacks.
Posted: 05 Dec 2014 | Published: 01 Nov 2014

A10 Networks

4 Requirements for a Multi-Cloud Security Approach
sponsored by Cloudvisory
WHITE PAPER: Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

4 Steps to Achieve Your CISSP Certification
sponsored by TechTarget
RESOURCE: Becoming a CISSP can open doors in your security career and improve your earning potential, so don't delay in obtaining our free CISSP study guide. Take our Web Security Survey to receive access to CISSP Prep: 4 Steps to Achieve Your Certification.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

TechTarget

4 Steps to Reduce the Risk of Malicious Insider Activity
sponsored by Veriato, Inc.
WHITE PAPER: Learn 4 key steps in implementing a risk-based monitoring program, culminating in an ability to appropriately monitor user activity at every level, all while ensuring security and privacy are maintained.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

4 Findings on Managed Services for Workloads in the Cloud
sponsored by Dimension Data
WHITE PAPER: Learn why and how IT and business leaders are selecting managed services for production workloads in the cloud.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Reasons to Refresh Your FlexPod
sponsored by NetApp & Cisco
WHITE PAPER: Discover the new technical innovations that provide FlexPod customers with lower costs and improved performance.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

TOPICS:  IT Management
NetApp & Cisco

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

4 Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: IT leaders must support mobile without allowing greater risk. Find out four key steps to safe, widespread mobility.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

4 Steps to Improving Cloud Security and Compliance
sponsored by Dimension Data
WHITE PAPER: Learn how to increase your comfort level in the cloud by insisting on the highest levels of certification and more.
Posted: 21 Jan 2016 | Published: 22 Jan 2016

TOPICS:  IT Management
Dimension Data

4 Ways to Improve IT Operations With All-Flash Storage
sponsored by NetApp
WHITE PAPER: Learn how to deploy 10x more virtual desktops and reduce latencies to less than one millisecond with all-flash storage.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

TOPICS:  IT Management
NetApp

451 Group Report on Federation Gateway Market & Cloud Access 360
sponsored by Intel
ANALYST REPORT: In this Market Insight Report, 451 Group Steve Coplan provides a comprehensive independent review of the Intel Expressway Cloud Access 360 federation gateway. Steve covers how Intel’s acquisition of Nordic Edge plays into Intel’s latest moves in the security sector.
Posted: 14 Mar 2011 | Published: 08 Mar 2011

Intel

451 Group Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This report analyzes where AlienVault fits into the SMB security market. Read on for descriptions of products that AlienVault offers and considerations surrounding the main strengths, weaknesses, opportunities and threats facing the organization in relation to its competitors.
Posted: 05 May 2014 | Published: 26 Mar 2014

AlienVault

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata
101 - 125 of 5931 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement