IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
126 - 150 of 6190 Matches Previous Page  |  Next Page
5 Counterintuitive Mistakes Companies Make When Going Digital
sponsored by Box
EBOOK: This eBook highlights five counterintuitive mistakes frequently made by organizations that seem rational when building a digital strategy, but actually can be course-altering mistakes. It also provides an alternate path to achieving the same objectives using approaches common in successful digital companies.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Box

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

5 Essential Approaches to Securing your WordPress Site
sponsored by Liquid Web
WHITE PAPER: As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Liquid Web

5 Focus Areas for Evolving Your ITSM Strategy to Drive Business Growth
sponsored by Cherwell
RESOURCE: Digital transformation is something that your organization is going to have to deal with if it hasn't already. There's no way to avoid it and stay competitive in today's marketplace. Read on to uncover the top five areas you will need to focus on in order to avoid failure with your digital transformation initiative.
Posted: 07 Jun 2017 | Published: 31 Dec 2015

Cherwell

5 Key Benefits of Securing Your Cloud with CASB
sponsored by Cisco Cloudlock
WHITE PAPER: Keep your cloud secure. Discover 5 key components that your CASB should have to ensure your organization's safety in the cloud.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

5 Myths about Privileged Access Security for AWS
sponsored by Centrify Corporation
EBOOK: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Benefits of Moving Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Ditch complex processes. Here are 5 reasons to move backup, archiving and disaster recovery to a single cloud platform.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

5 Best Practices: Moving From Monitoring to Blocking Content
sponsored by Intel Security
WHITE PAPER: In 2015 almost 800 data breaches hit US-based companies. Discover the 5 best practices to protect your organization.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Cloud Security Concerns You Must Address
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett Packard Enterprise

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: Keep these five considerations in mind when implementing a hybrid cloud strategy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations in Cloud Providers for Product Applications
sponsored by Dimension Data
WHITE PAPER: Cloud investment continues to skyrocket. Find out five areas to focus on to be sure you choose the right vendor.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

TOPICS:  IT Management
Dimension Data

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: Learn the best ways to ensure your design allows you to monitor today's increasingly complex networks and critical data.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett Packard Enterprise

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Mainframe Myths Debunked
sponsored by Global Technology Solutions Group
EGUIDE: There are countless outdated myths surrounding mainframe computers. But how do you know what's true about the modern mainframe, and what are outdated misconceptions? This exclusive guide explores the state of the modern mainframe today, and debunks common myths.
Posted: 20 Jun 2016 | Published: 16 Jun 2016

Global Technology Solutions Group

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Highly manageable infrastructure improves productivity and lowers TCO. Discover 5 tips for evaluating IT architecture.
Posted: 11 Mar 2015 | Published: 24 Nov 2014

TOPICS:  IT Management
Dell, Inc. and IntelĀ®

5 Reasons IBM May Solve Your Data Storage Challenges
sponsored by IBM
WEBCAST: Frost & Sullivan explains the five ways your enterprise can benefit from IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

5 Reasons to Choose Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Don't fall behind. Invest in converged infrastructure and profit from these five benefits.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC
126 - 150 of 6190 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement