IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
226 - 250 of 4867 Matches Previous Page  |  Next Page
Accelerate Your Digital Business Through Cybersecurity
sponsored by Dimension Data
VIDEO: Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.
Posted: 19 Apr 2016 | Premiered: 01 Feb 2016

Dimension Data

Accelerating Business Transformation Through IT Innovation
sponsored by Dimension Data
WHITE PAPER: This report uses survey results and IT leaders' insights to discuss what's keeping businesses from embracing IT innovation, and what can be done to get around these barriers.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Dimension Data

Accelerating Digital Marketing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from CEB debunks the myths over the relationship between CIOs and CMOs and shows how CIOs can play a critical role in accelerating digital marketing.
Posted: 30 May 2014 | Published: 30 May 2014

ComputerWeekly.com

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks
WHITE PAPER: This essential white paper outlines the advantages of managed security services providers and how your incident response strategy is key to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks

Accenture Technology Vision 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Download this report from Accenture to discover the 6 IT technology trends that will impact CIOs in 2012.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

ComputerWeekly.com

Access + Federation = Better Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Find out how federated SSO, when combined with access management, enables you to authenticate users in the domain where their identities are stored and provide access management for any app, including mobile. View now and learn how to centralize access control for all types of clients.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

Achieve better cloud security for your enterprise
sponsored by TechTarget
RESOURCE: With major cloud security breaches a frequent occurrence; it's no surprise that the number one concern for organizations moving data to the cloud is security. This is why our comprehensive e-guide, Enhancing Cloud Security, ensures you are taking every precaution available to protect your data.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Enterprise

Accelerate Windows 7 Migration with User Virtualization
sponsored by AppSense
WHITE PAPER: The Microsoft workstyle is changing. The old desktop computer is being replaced by the digital generation and fast-paced, tech-savvy devices. Access this resource to learn about the new Microsoft workstyle, which promotes anywhere connection, intelligent infrastructure, cloud management and multiple Windows-based devices.
Posted: 03 Oct 2012 | Published: 01 Feb 2012

AppSense

Accelerate Your Windows Server 2003 Migration
sponsored by HP
WHITE PAPER: Support for Windows Server 2003 is ending. Read why flexible plans can help you be sure you make the best transition.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

TOPICS:  IT Management
HP

Accelerating Business Transformation Through IT Innovation
sponsored by Dimension Data
WHITE PAPER: Executives are frustrated with slow deployment of new tech. Learn why they should use new metrics to speed growth.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

TOPICS:  IT Management
Dimension Data

Accelerating Design With Virtual Workspaces
sponsored by NVIDIA/VMware
WHITE PAPER: Architecture firm BLDD needed lower costs and better collaboration. Find out how they got just that through modern VDI.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

TOPICS:  IT Management

Accelerating Virtual SAN With SSDs
sponsored by Micron Technology
WHITE PAPER: The latest VSANs scale-up with hardware-agnostic direct-attached storage. Learn how they easily boost performance.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

TOPICS:  IT Management
Micron Technology

Accellion raises the bar in secure cloud-based file sharing
sponsored by Accellion, Inc.
WHITE PAPER: The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing.
Posted: 25 Jun 2013 | Published: 04 Dec 2012

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Access Accounts More Securely with IntelĀ® Identity Protection Technology
sponsored by Intel
PRODUCT OVERVIEW: This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them.
Posted: 03 Aug 2011 | Published: 02 Aug 2011

Intel

Access Control in Virtual Environments
sponsored by FoxT
WHITE PAPER: The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources.
Posted: 16 Jun 2008 | Published: 16 Jun 2008

FoxT

Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell, Inc.
EBOOK: Discover a next-generation firewall solution that combats emerging threats effectively and without compromise while reducing the total cost of ownership (TCO). Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell, Inc.

Achieve Hybrid Storage With Cloud Economics and Agility
sponsored by Microsoft
WHITE PAPER: Learn how to improve overall cost of storage by up to 60% while increasing storage agility.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

TOPICS:  IT Management
Microsoft

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

IBM

Achieving Cost Savings in Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.
Posted: 09 Jul 2010 | Published: 09 Jul 2010

ExaGrid Systems, Inc.

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009

Lumension

Achieving PCI Compliance with Log Management
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement.
Posted: 17 Jul 2008 | Published: 16 Jul 2008

Hexis Cyber Solutions Inc
226 - 250 of 4867 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement