IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
226 - 250 of 3487 Matches Previous Page  | Next Page
Analyst's take: Managing IT in an economic downturn
sponsored by ComputerWeekly.com
WHITE PAPER: As companies face the prospect of a recession, IT is even more challenged to justify and deliver value while avoiding risky projects.  This is not the time to slash budgets; instead, follow a few rules to simplify decision making and focus your investment in areas that deliver the greatest return.
Posted: 20 Oct 2011 | Published: 04 Mar 2011

ComputerWeekly.com

Analyst's take: Nucleus Research's top 10 IT predictions for 2010
sponsored by ComputerWeekly.com
WHITE PAPER: The cloud continues to drive both rapid ROI and new ISV business models.  Beyond the cloud, expect 2010 to bring greater use of analytics, automation, and CRM, and a permanent shift in structural unemployment.  Bid auf Wiedersehen to the vendors who still haven’t gotten it.
Posted: 24 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

Analytics across the ecosystem
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Analytics is a key enabler for life sciences and healthcare organizations to create better outcomes for patients, customers and other stakeholders across the entire healthcare ecosystem, according to this research from IBM.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

ComputerWeekly.com

And the Winner Is...The 2013 Impact Awards
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Antivirus Evasion Techniques Show Ease In Avoiding Antivirus Detection
sponsored by Malwarebytes Corporation
EGUIDE: This expert e-guide uncovers what's next for avoiding some of the most dangerous cyber-attacks.
Posted: 21 Mar 2014 | Published: 21 Mar 2014


Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by SearchSecurity.com
EBOOK: This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

SearchSecurity.com

Application Performance Management for Dummies
sponsored by Riverbed Technology, Inc.
EBOOK: Application performance management helps deliver the application performance users and the business demand. Effectively monitoring and troubleshooting application performance issues requires a comprehensive solution.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Riverbed Technology, Inc.

Application Services: Connect and grow to create seamless, secure, and context-aware experiences
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this whitepaper to learn how third-party IT services can drastically ease the pain of modernizing your IT portfolio.
Posted: 30 Jan 2013 | Published: 31 Dec 2011

Hewlett-Packard Company

Analog to IP Migration Strategy
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This resource notes the trend in high-definition (HD) video cameras for enhanced video surveillance, and how the migration from analog to IP can be customized to fit your organization's needs.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Anatomy of an IPv6 Unicast Address
sponsored by Command Information
PRODUCT LITERATURE: IPv6 is the next generation Internet protocol. It was designed to replace the current version, IPv4, and will bring superior reliability, flexibility and security to the Internet.
Posted: 09 Jun 2008 | Published: 01 Jan 2007

Command Information

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Antivirus Evaluation Guide
sponsored by Threat Track
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track

AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER: This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

MobileIron

Application Compatibility - The Key to Preparing for Windows 7
sponsored by Centrix Software
WHITE PAPER: This resource provides answers to your top Windows 7 migration questions and more. Learn how to successfully prepare for Windows 7 by determining what applications are being used before the application compatibility process even starts.
Posted: 05 Mar 2012 | Published: 22 Feb 2012

Centrix Software

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
sponsored by BlueCoat
WHITE PAPER: Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

BlueCoat

Application Rationalization Datasheet
sponsored by Apptio
WHITE PAPER: To achieve decision agility, IT organizations need a scalable way to make business sense out of disconnected financial, operational, and project data about their application portfolio. Read on to learn more about innovative solutions!
Posted: 16 Oct 2013 | Published: 15 Oct 2013

Apptio

Application Release Automation: An Introduction
sponsored by UC4 Software, Inc
VIDEO: Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.
Posted: 02 Apr 2012 | Premiered: 31 Jan 2012

UC4 Software, Inc

Application Security Assessment Options
sponsored by Security Innovation
EGUIDE: This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Security Innovation

Application Security in the Cloud with BIG-IP ASM
sponsored by F5 Networks
WHITE PAPER: Access this white paper to discover a high-performance web application firewall that provides a strategic point of control within the infrastructure from which enterprises can adapt to changing conditions. Learn how your organization can benefit from this cloud-ready solution, offering cloud security for virtualized applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

F5 Networks

Application Security Viewpoint
sponsored by Ounce Labs, an IBM Company
PODCAST: Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them.
Posted: 03 Feb 2010 | Premiered: Feb 3, 2010

Ounce Labs, an IBM Company

Application Virtualization and Desktop Virtualization Are Better Together
sponsored by Citrix
WHITE PAPER: This document is designed to help Citrix XenApp customers understand how and when Citrix XenDesktop can be used with Citrix XenApp to deliver virtual desktops to further reduce application and desktop computing costs.
Posted: 05 Nov 2008 | Published: 05 Nov 2008

Citrix

Application Visibility and Control
sponsored by Aerohive Networks
WHITE PAPER: Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Aerohive Networks
226 - 250 of 3487 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement