IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
201 - 225 of 4944 Matches Previous Page  |  Next Page
A Quantum Leap in Hyper-converged Infrastructure: The VCE VxRail Appliance
sponsored by Avnet Technology Solutions
WHITE PAPER: In this paper, discover how to create an automated, dynamic infrastructure that quickly adopts to business demands with the VCE hyper-converged infrastructure appliance. Read on to take advantage of a full suite of industry-leading data services, including replication, backup, and cloud tiering.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

Avnet Technology Solutions

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

A Software Defined Data Center Approach for a "Zero Trust" Security Strategy
sponsored by VMware
WHITE PAPER: Today, the software-defined data center (SDDC) is demonstrating a multitude of benefits beyond agility, speed, and efficiency. This white paper outlines the security capabilities made possible by an SDDC approach when used with the VMware NSX network virtualization platform.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

A Solutions Guide to Hyperconverged Infrastructure for Enterprise Applications
sponsored by Softchoice Corporation
WHITE PAPER: From this white paper, you will learn why hyperconverged infrastructure is the perfect web-scale infrastructure for enterprise applications, and see how this combo is revolutionizing today's enterprise data centers. Read on to discover how this HCI delivers compromise-free performance.
Posted: 10 Mar 2016 | Published: 31 May 2015

Softchoice Corporation

A Strategy for Ideal Branch Converged Infrastructure
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Learn how to handle siloed IT functions with an end-to-end strategy that delivers on IT priorities today and tomorrow.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

A Unified Strategy for Cloud and Mobile Integration
sponsored by Oracle Corporation
WHITE PAPER: This publication introduces new features and capabilities in the areas of cloud, mobile, and IoT integration, in addition to managed file transfer (MFT). Access now to learn a cohesive approach to meeting pressing integration requirements.
Posted: 30 Sep 2015 | Published: 31 Dec 2014

Oracle Corporation

ABCs of ITIL®
sponsored by Global Knowledge
WHITE PAPER: Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Global Knowledge

About to Buy Guide: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

SearchSecurity.com

About to Buy: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

SearchSecurity.com

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A SaaS-First Approach to Application Porfolio Management
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the virtues of SaaS for business operations and where the technology is headed.
Posted: 10 Oct 2013 | Published: 13 Oct 2011

BMC Software, Inc.

A Simple Building Block for Software-Defined Data Center
sponsored by VMware
WHITE PAPER: Simplify your entire IT infrastructure lifecycle with EVO:RAIL
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TOPICS:  IT Management
VMware

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Superior Hardware Platform for Server Virtualization
sponsored by Intel Corporation
TECHNICAL ARTICLE: Server virtualization is helping IT organizations improve data center productivity in fundamental ways. To gain the full value of virtualization, you need servers that are built to handle the heavy and ever-changing demands of a virtualized and consolidated computing environment. Read on to learn more . . .
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Intel Corporation

A Superior Hardware Platform for Server Virtualization - Improving Data Center Flexibility, Performance and TCO with the Intel® Xeon® Processor 5500 Series
sponsored by Insight & Intel
PRODUCT OVERVIEW: To gain full value of virtualization, you need servers that are built to handle the heavy and ever-changing demands of a virtualized and consolidated computing environment. To help you get maximum benefits from virtualization, Intel has built a better physical server platform with unique hardware-assist features to enhance the virtual data center.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Insight & Intel

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

A Unified Approach to Managing the Virtual Infrastructure
sponsored by Forsythe
WHITE PAPER: Managing the virtual infrastructure end-to-end is becoming more challenging as virtual environments continue to grow and more data center elements meld into the "cloud". This whitepaper will discuss the push for continued virtualization and the "cloud", and present you with questions that will help you create the best organizational strategy.
Posted: 23 Nov 2009 | Published: 23 Nov 2009

Forsythe

A Whirlwind Tour of Wireless Vulnerabilities
sponsored by AirMagnet
PRESENTATION TRANSCRIPT: This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AirMagnet

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Aberdeen Report: Achieving Quality across the Global Manufacturing Network
sponsored by Infor
WHITE PAPER: Companies that are disciplined in managing the quality of their engineering, manufacturing, purchasing and human resource operations perform better. Read this white paper today to learn what strategic actions organizations can take to improve q...
Posted: 10 Nov 2006 | Published: 01 Dec 2005

Infor

Accelerate Decision-Making With Unified Communications
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Today's workplace can't survive without collaborative tools. Find out how safer meetings reduce costs.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  IT Management
Hewlett-Packard Enterprise
201 - 225 of 4944 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement