IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
226 - 250 of 4066 Matches Previous Page  | Next Page
Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 28 May 2014 | Premiered: Oct 23, 2013

Hexis Cyber Solutions Inc

Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 27 May 2014 | Premiered: May 27, 2014

Hexis Cyber Solutions Inc

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks UK

Affinity Credit Union chooses HP Fortify on Demand - Cloud-based security assessment service for mobile remote deposit capture application
sponsored by Hewlett-Packard Limited
CASE STUDY: This resource shows the benefits associated with cloud-based security assessment services and how you can apply them to your business.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Limited

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Air Transport Industry Insights 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from SITA looks at the impact of business intelligence on airlines and airports.
Posted: 01 May 2014 | Published: 01 May 2014

ComputerWeekly.com

Airline IT Trends Survey
sponsored by ComputerWeekly.com
WHITE PAPER: For the 11th year in succession, the Airline IT Trends Survey tracks the key technology trends in the airline industry. It demonstrates the role that the survey’s global benchmarks play in underlining the importance of IT within the airline industry, while also stimulating debate in boardrooms worldwide about the way ahead.
Posted: 24 Oct 2011 | Published: 24 Jun 2010

ComputerWeekly.com

Airline Transforms IT Project Management with PPM
sponsored by CA Technologies.
CASE STUDY: To stay on top in a competitive industry, Qantas, Australia's largest airline, wanted to transform their IT project management strategy. In this case study, explore how Qantas implemented a project and portfolio management (PPM) tool to improve IT project visibility and reporting for over 200 projects.
Posted: 06 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
sponsored by Citrix
WHITE PAPER: Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
Posted: 19 Sep 2008 | Published: 07 Jun 2010

Citrix

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Advanced Uses of Oracle Enterprise Manager 11g
sponsored by Oracle Corporation
WHITE PAPER: In this paper, we discuss how Oracle Enterprise Manager 11g's advanced management capabilities help IT organizations cut through the complexity and bring order to chaos through its unique business-driven IT management approach. 
Posted: 12 Apr 2011 | Published: 01 Oct 2010

Oracle Corporation

Advanced Virtualization E-Book - Chapter 3: Essentials of High-Availability Planning
sponsored by Dell, Inc. and Intel®
EBOOK: Design, management and testing can make or break high availability in your virtual environment. Chapter 3 of this Advanced Virtualization E-Book discusses the essentials of high availability planning.
Posted: 05 Mar 2010 | Published: 05 Mar 2010

Dell, Inc. and Intel®

Advancing the Economics of Networking: Ethernet Switching Solutions Reduce Capital and Operational IT Expenses
sponsored by Juniper Networks, Inc.
WHITE PAPER: Aging network systems and old habits have dictated how businesses spend their IT budgets. As a result, too many IT dollars are being spent on just barely remaining competitive with emerging companies and their newer IT infrastructures. Read this white paper to learn more about a new family of solutions that reduce IT expenses and free up budgets.
Posted: 10 Feb 2010 | Published: 10 Oct 2009

Juniper Networks, Inc.

Advantage of the CMOS Sensor: Latest image sensor technology for HD security
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This white paper features an improved video structure for security system cameras that provides high-definition (HD) picture quality and high-sensitivity sensors to ensure the top monitoring capabilities.
Posted: 03 Oct 2013 | Published: 31 Dec 2011

Sony Electronics Asia Pacific Pte Ltd

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

Agentless Security for Vmware Virtual Data Centers and Cloud
sponsored by Trend Micro
WHITE PAPER: This resource will help you understand how applying traditional architectures to virtual environments can hurt your organization's productivity and security posture, and what you need to do in order to secure your virtual environment effectively. Read on to learn more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

AGESIC (Uraguay)
sponsored by IBM
CASE STUDY: Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Akershus University Hospital: Safeguarding patient privacy with security information and event management
sponsored by RSA, The Security Division of EMC
CASE STUDY: Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.
Posted: 20 Aug 2009 | Published: 17 May 2009

RSA, The Security Division of EMC
226 - 250 of 4066 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement