IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
151 - 175 of 6503 Matches Previous Page  |  Next Page
5 Cyberthreats Healthcare IT Pros Must Tackle
sponsored by Mimecast
WHITE PAPER: Defending your data against cyberthreats requires a multilayer defense. Check out this white paper to uncover the 5 critical cyberthreats of which IT healthcare professionals should be aware.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

5 Essential Approaches to Securing your WordPress Site
sponsored by Liquid Web
WHITE PAPER: As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Liquid Web

5 Key Analytics and Machine Learning Takeaways
sponsored by Splunk
WHITE PAPER: Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Splunk

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

5 Best Practices: Moving From Monitoring to Blocking Content
sponsored by Intel Security
WHITE PAPER: In 2015 almost 800 data breaches hit US-based companies. Discover the 5 best practices to protect your organization.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Cloud Security Concerns You Must Address
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett Packard Enterprise

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: Keep these five considerations in mind when implementing a hybrid cloud strategy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations in Cloud Providers for Product Applications
sponsored by Dimension Data
WHITE PAPER: Cloud investment continues to skyrocket. Find out five areas to focus on to be sure you choose the right vendor.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

TOPICS:  IT Management
Dimension Data

5 Criteria for Making an Informed Investment
sponsored by NetApp & Cisco
WHITE PAPER: Looking to solve IT challenges with converged infrastructure? Consider these five criteria when assessing your options.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

TOPICS:  IT Management
NetApp & Cisco

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: Learn the best ways to ensure your design allows you to monitor today's increasingly complex networks and critical data.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett Packard Enterprise

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Mainframe Myths Debunked
sponsored by Global Technology Solutions Group
EGUIDE: There are countless outdated myths surrounding mainframe computers. But how do you know what's true about the modern mainframe, and what are outdated misconceptions? This exclusive guide explores the state of the modern mainframe today, and debunks common myths.
Posted: 20 Jun 2016 | Published: 16 Jun 2016

Global Technology Solutions Group

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Highly manageable infrastructure improves productivity and lowers TCO. Discover 5 tips for evaluating IT architecture.
Posted: 11 Mar 2015 | Published: 24 Nov 2014

TOPICS:  IT Management
Dell, Inc. and Intel®

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

5 Reasons IBM May Solve Your Data Storage Challenges
sponsored by IBM
WEBCAST: Frost & Sullivan explains the five ways your enterprise can benefit from IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

5 Reasons to Choose Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Don't fall behind. Invest in converged infrastructure and profit from these five benefits.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

5 Reasons to Choose Hyper-Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Excel in today's digital economy and drive business results with HCI. Discover five reasons to adopt.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

5 reasons why your data center is everywhere
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: In the following white paper, uncover the inherent nature of modern applications and learn how you must address your data center infrastructure to ensure your application operations are as effective and valuable as they should be. Access now to learn more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies
151 - 175 of 6503 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement