IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
201 - 225 of 4096 Matches Previous Page  | Next Page
Achieving Security with Cloud Data Protection
sponsored by HP Autonomy
WHITE PAPER: This exclusive paper discusses a hosted data storage solution that enables you to reduce the costs, risks and complexity of storing and protecting your business information, taking a heightened focus on security, privacy and cost savings to go beyond simple storage to enterprise cloud security.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

HP Autonomy

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

ActivID® Threat Detection Service
sponsored by HID
DATA SHEET: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Acumin Contract Rate Index August 2012
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

ComputerWeekly.com

Addressing Data Security In The Cloud And Low Cost Large File Transfer
sponsored by SearchSecurity.com
EGUIDE: The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

SearchSecurity.com

Advanced Attacks Demand New Defenses
sponsored by McAfee, Inc.
WHITE PAPER: Find out how your business should fight back against cyber-criminals utilizing APTs.
Posted: 04 Aug 2014 | Published: 28 Feb 2014

McAfee, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

IBM

Achieving Cost Savings in Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.
Posted: 09 Jul 2010 | Published: 09 Jul 2010

ExaGrid Systems, Inc.

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009

Lumension

Achieving PCI Compliance with Log Management
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement.
Posted: 17 Jul 2008 | Published: 16 Jul 2008

Hexis Cyber Solutions Inc

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

Actionable Enterprise Architecture
sponsored by IBM
WHITE PAPER: This white paper provides an overview of the enterprise architecture concept and highlights how an actionable enterprise architecture approach from IBM can help organizations manage complexity and align IT projects and solutions with business objectives.
Posted: 11 Sep 2009 | Published: 01 Jun 2009

IBM

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

Active Directory Expert Best Practices and Security Tips
sponsored by Centrify Corporation
EGUIDE: Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Centrify Corporation

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
Posted: 28 Aug 2012 | Published: 21 Aug 2012

Dell Software

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Adaptive Access Management: An ROI Study
sponsored by Oracle Corporation
WHITE PAPER: Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
Posted: 31 Mar 2011 | Published: 01 Sep 2010

Oracle Corporation

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Addressing Mobile Threats: Effective Detection and Response
sponsored by ArcSight, an HP Company
WHITE PAPER: Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.
Posted: 19 Oct 2009 | Published: 07 Mar 2007

ArcSight, an HP Company

Addressing Single Sign-On Inside, Outside, and Between Organizations
sponsored by Prolifics, A Premier IBM Business Partner
WHITE PAPER: This white paper examines how IBM Tivoli Unified Single Sign-On addresses the needs of organizations for enterprise single sign-on, Web single sign-on, and federated single sign-on.
Posted: 03 Aug 2010 | Published: 29 Dec 2008

Prolifics, A Premier IBM Business Partner

Admiral Group ensures superb performance and scalability
sponsored by IBM
WHITE PAPER: Read this white paper to learn how one growing organization leveraged an advanced platform to scale and meet increasing demands. Discover how they were able to improve the overall performance of their systems, enabling them to cut costs and respond quicker to changing requirements.
Posted: 06 Jun 2012 | Published: 30 Jun 2011

IBM

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.
201 - 225 of 4096 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement