IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
101 - 125 of 6438 Matches Previous Page  |  Next Page
3 Steps to Faster EMR Adoption with Desktop Virtualization
sponsored by Imprivata
WHITE PAPER: Inside, uncover a 3-step process that will not only help you accelerate EMR adoption and achieve Meaningful Use but also provides the benefits of two extremely helpful technologies: desktop virtualization and VDI.
Posted: 04 Sep 2013 | Published: 30 Dec 2011

Imprivata

3 Steps to Protect Your Data During the High Risk Exit Period
sponsored by Veriato, Inc.
WHITE PAPER: Discover 3 steps that can be put in place to mitigate the risk that employees place on your enterprise when they leave and take sensitive data with them.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Veriato, Inc.

3 Tips for Virtual Environments and the Modern Data Center
sponsored by Commvault
VIDEO: Your hybrid IT strategy needs to include a plan for modernizing the data center assets you own and operate, including the virtual environments that you rely on every day. Discover how to avoid adding a new management tool for every new piece of infrastructure or cloud that is adopted into the hybrid IT estate.
Posted: 11 Aug 2017 | Premiered: 31 Jul 2017

Commvault

3 Ways EFSS Enables Secure Content Collaboration
sponsored by Citrix
WHITE PAPER: The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Citrix

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce
sponsored by Citrix
WHITE PAPER: When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.
Posted: 17 Jul 2017 | Published: 31 May 2017

Citrix

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

3 Ways to Help Stop Data Leakage in Your Organization
sponsored by Lepide Software
EGUIDE: It seems that almost every month there's another high-profile security breach in which sensitive data is leaked. In almost every case, the end result of these data leaks is damage to the reputation and/or bottom line of the company's involved. In this guide, learn 3 ways you can help prevent data leaks within your organization.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Lepide Software

3 Ways Your Service Desk Can Increase Business Trust with Agile
sponsored by Cherwell
MICROSITE: Service desks are losing their good reputation, being seen as slow and unhelpful. Read on to learn about the three keys to building business trust with your service desk utilizing Agile methodology.
Posted: 13 Jun 2017 | Published: 17 Oct 2016

Cherwell

31% of Apps Used in Educational Institutions are Risky
sponsored by Cisco Cloudlock
WHITE PAPER: The cloud is revolutionizing education, but at the cost of massive security risk. Learn how certain cloud apps could lead to traumatic and costly data breaches, as well as how to mitigate the threat they pose.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Cisco Cloudlock

360 Data Management For GDPR
sponsored by Avnet
WHITE PAPER: In an effort to prepare for the GDPR, organizations are trying to move from slow-moving, traditional approaches to digitally-driven operations that capitalize on previously inaccessible market opportunities.
Posted: 18 Sep 2017 | Published: 31 Mar 2017

Avnet

360 Data Management for GDPR
sponsored by Avnet
WHITE PAPER: The GDPR is by far and away the most comprehensive global privacy regulation ever developed. Read this whitepaper to reveal approaches you can take to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Avnet

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

TrendMicro

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: The GRC landscape is changing quickly, are you ready to adapt? Explore these 4 critical elements of a successful GRC implementation and see what they can do for your organization.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

3 Steps to Building a Successful ECM Project
sponsored by OnBase by Hyland
WHITE PAPER: You have a vision of an ECM project, but how do you get there? Find out the steps, from design to execution.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Steps to Secure Cloud Database-as-a-Service
sponsored by Oracle Corporation UK Ltd
EGUIDE: Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.
Posted: 06 Oct 2016 | Published: 04 Oct 2016

Oracle Corporation UK Ltd

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

3 Things to Know Before Moving Your Data to the Cloud
sponsored by Veritas
WHITE PAPER: Moving secondary data to the cloud seems simple. Take three steps to prevent a host of negative consequences.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

3 Tips Before Hitting Accept on Your Public Cloud Contract
sponsored by Veritas
WHITE PAPER: Be sure to understand three key points about how your public cloud provider will handle your data and your relationship.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

4 Economic Benefits Driving Converged IT
sponsored by Dell EMC
WHITE PAPER: Converged infrastructure allows IT to simplify. Learn the four key drivers influencing companies to make the move.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

4 Findings on Managed Services for Workloads in the Cloud
sponsored by Dimension Data
WHITE PAPER: Learn why and how IT and business leaders are selecting managed services for production workloads in the cloud.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

4 Key Advantages of HCI Solutions
sponsored by Dell EMC
WHITE PAPER: Learn why 85% of organizations are deploying hyper-converged solutions.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC
101 - 125 of 6438 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement