IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
26 - 50 of 6452 Matches Previous Page  |  Next Page
10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

11 Policies to Keep Your Apps Secure
sponsored by Blue Cedar
WHITE PAPER: This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

13 Essential Steps to Meeting the Security Challenges
sponsored by Tenable, Inc.
WHITE PAPER: While multinational companies can likely meet some of the GDPR requirements right now, most will find that they have a lot of work to do in order to meet full compliance. Key into this white paper to gain a deeper understanding of GDPR and why the regulation is important to IT professionals.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explains how to overcome the complexity of security operations integration and enable high-speed communication between applications for the protection you need today.
Posted: 17 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

15 Essential DNS and DNSSEC Monitoring Tests
sponsored by Men and Mice
WEBCAST: Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.
Posted: 03 Nov 2017 | Premiered: Nov 10, 2016

Men and Mice

16 Ways to Protect your Cloud from Ransomware
sponsored by evident.io
EBOOK: Read this e-book to uncover 16 steps your organization can take to protect your cloud from ransomware.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

DellEMC and Intel®

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

15 Popular IT and Business Certifications
sponsored by Global Knowledge
WHITE PAPER: This report reviews the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

20 Practical Tips for Single Sign-On Implementation
sponsored by Imprivata
WHITE PAPER: Uncover 20 valuable tips to ensure successful SSO for your organization, so that your care providers can spend less time remembering passwords and more time treating patients.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Imprivata

20 Reasons to Move Backup and Disaster Recovery to the Cloud
sponsored by Druva Software
WHITE PAPER: Cloud-based platforms are the way of the future. Gain these 20 business benefits when choosing a unified cloud solution.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Enterprise
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Enterprise

2013 Impact Awards Reveal Industry Top Players
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension
26 - 50 of 6452 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement