IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
226 - 250 of 5457 Matches Previous Page  |  Next Page
A New Service App Store for the Digital Workplace
sponsored by BMC
WHITE PAPER: If only delivering IT and business services were as easy as accessing an app store. Discover ways to end the so-called "catalog sprawl," boost worker productivity, and reduce unauthorized IT when you enable one-stop shopping for IT and business services.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BMC

A Next-Generation Analytics Platform for Optimizing Critical Application Operations in Virtualized Environments
sponsored by SIOS Technology Corp
WHITE PAPER: This white paper explores a next-generation IT analytics platform that is adaptable and scalable to meet the needs of IT departments in virtual environments. Access now and learn how this platform enables you to consolidate a variety of data sources into a single repository where it can apply advanced analytics.
Posted: 20 Apr 2016 | Published: 31 Dec 2015

SIOS Technology Corp

A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER: This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

A Practical Approach to ITIL Adoption
sponsored by ServiceNow
EBOOK: The adoption of ITIL is widespread and tens of thousands of companies are already reaping its benefits. But, as with any process, there are a number of common ITIL adoption mistakes to avoid. Access this eBook to avoid the top 5 ITIL implementation mistakes and ensure the success of your efforts.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

ServiceNow

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

A Prescriptive Approach to Simpler, Faster and More Cost-Effective Project and Portfolio Management
sponsored by CA Technologies
WHITE PAPER: Learn how project and portfolio management (PPM) technologies, organizations can find smart, cost-effective ways to address market demands while balancing costs and driving more business value.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

A Security Delivery Platform Benefits the Entire Organization
sponsored by Gigamon
WHITE PAPER: As the cybersecurity threat landscape continues to evolve, organizations need to start taking into account current and future cybersecurity trends. Examine a solution that provides the network visibility you need to improve protection.
Posted: 09 Jun 2016 | Published: 09 Jun 2016

Gigamon

A Shift in Enterprise Storage
sponsored by IBM
VIDEO: Learn how to gain greater capacity in less rack space, with the ability to scale up flash capacity to 2 petabytes.
Posted: 01 Jul 2016 | Premiered: 01 Jul 2016

TOPICS:  IT Management
IBM

A Simple Approach to a Linux Infrastructure
sponsored by IBM
PRODUCT LITERATURE: LinuxONE Rockhopper is your entry point to the innovative, simple, flexible, secure and trusted LinuxONE portfolio.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

TOPICS:  IT Management
IBM

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

A Planner's Realistic Guide to Cloud Data Security
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide will walk you through the creation of a safe and secure cloud environment.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

Dell, Inc. and Intel®

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: DoS attacks have grown, and now they target more businesses than ever. See how you can get a robust, affordable defense.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

TOPICS:  IT Management
Citrix

A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

A Practical Approach to Wireless 2.0
sponsored by Aerohive Networks
WHITE PAPER: Have you ever seen or experienced a Wi-Fi network that was as reliable as a light switch? Me either. That brings me to the point of this whitepaper: Wireless 2.0.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Aerohive Networks

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Fujitsu

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Prescription for Privacy
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

A Proactive Approach to Compliance, Security and Audit
sponsored by IBM
WEBCAST: This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

IBM

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A SaaS-First Approach to Application Porfolio Management
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the virtues of SaaS for business operations and where the technology is headed.
Posted: 10 Oct 2013 | Published: 13 Oct 2011

BMC Software, Inc.

A Simple Building Block for Software-Defined Data Center
sponsored by VMware
WHITE PAPER: Simplify your entire IT infrastructure lifecycle with EVO:RAIL
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TOPICS:  IT Management
VMware
226 - 250 of 5457 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement