IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
201 - 225 of 6460 Matches Previous Page  |  Next Page
5 Ways to Save on IBM Licensing
sponsored by Snow Software
WHITE PAPER: This white paper explores how to put an effective software asset management strategy in place that's tailored to the complexities of IBM-specific processes and products. Access now to discover how you can increase the efficiency of entitlement management, licensing, and more.
Posted: 10 Oct 2016 | Published: 16 Mar 2016

Snow Software

5 Ways Virtualization Enhances Security and Productivity
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

5th edition of the latest trends and insights for CIOs, CTOs and CDOs.
sponsored by ComputerWeekly.com
EGUIDE: Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

ComputerWeekly.com

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec
WHITE PAPER: This guide examines 6 important issues to consider when moving enterprise data and applications to the cloud. Learn how to navigate the perils of complexity through smart policies, consider data loss prevention issues, and 4 more ways to migrate to the cloud responsibly.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments
sponsored by Alert Logic
EBOOK: In this e-book, uncover the challenges of achieving continuous PCI DSS compliance across complex multi-cloud landscapes and the 6 criteria to consider when evaluating compliance solutions.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Alert Logic

6 Tips for Msps ro Enhance Their Offerings
sponsored by SolarWinds, Inc.
WHITE PAPER: By enhancing their capabilities, MSPs are able to differentiate their service, be more proactive, and command higher margins. Learn 6 tips on how your MSP can enhance its offerings and provide your clients with superior, modern protection.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

SolarWinds, Inc.

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

7 Critical Considerations for Choosing a Cloud Security Provider
sponsored by Akamai
WHITE PAPER: Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud and uncover the 7 key factors to consider when evaluating a cloud provider.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

5 Ways Veritas Makes VMware vSphere Backup Rock!
sponsored by Veritas
WHITE PAPER: Learn five ways to simplify and transform the protection of your VMware physical and cloud environments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

5 Ways Veritas NetBackup 8 Makes Microsoft Hyper-VBackup Rock!
sponsored by Veritas
WHITE PAPER: Discover how to achieve near 100% backup and recovery success rates in a Hyper-V environment.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

6 Critical Criteria for Small Business Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper reviews both the unique pain points faced by small businesses in regards to data protection, as well as the solution provided by Datto ALTO, the first backup and disaster recovery (BDR) solution designed specifically for small business with the power of an enterprise BDR.  And at a small business price point.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Datto, Inc.

6 Critical Trends in Smart Healthcare Technology
sponsored by Avaya
RESOURCE: Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Avaya

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

6 Questions to Ask SaaS E-Commerce Vendors
sponsored by Oracle Corporation
WHITE PAPER: Don't just look at bells and whistles. Learn strategic questions to ask that ensure you find the best partner in SaaS.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

6 Reasons to Boot Enterprise Servers From Enhanced SSD
sponsored by Micron Technology
WHITE PAPER: Choosing between HDD and SSD as you build your server? Find out how SSD creates better resiliency, lower costs and more.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

TOPICS:  IT Management
Micron Technology

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Tomorrow's workloads will be even heavier than today's. Learn how to future-proof your server to scale as demand grows.
Posted: 11 Mar 2015 | Published: 31 Jan 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Symantec & Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Symantec & Blue Coat Systems

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic
201 - 225 of 6460 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement