IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
26 - 50 of 3487 Matches Previous Page  | Next Page
2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

2013 Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: To construct a better security strategy and prevent future attacks, access this analyst report by the Ponemon Institute for insight on the economic reality of cybercrime's effect on an organization.
Posted: 25 Nov 2013 | Published: 31 Oct 2013

Hewlett-Packard Company

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

2013 Critical Capabilities for SIEM
sponsored by IBM
ANALYST REPORT: In this Gartner report, unveil a vendor comparison of the top 13 security information and event management (SIEM) offerings in the market today, and learn which capabilities are drawing businesses' attention.
Posted: 24 Feb 2014 | Published: 07 May 2013

IBM

2013 Fourth Annual Cost of Cyber Crime Study
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores the state of cybercrime in today's IT landscape and provides global statistics on the high costs of security breaches.
Posted: 11 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Limited

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM

2013 Magic Quadrant for SIEM
sponsored by IBM
ANALYST REPORT: This Gartner Magic Quadrant highlights the top 16 SIEM vendors in the market today, and why many are offering threat intelligence and security analytics with their services.
Posted: 24 Feb 2014 | Published: 07 May 2013

IBM

2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Company

451 Research Report: SIEM Platform of Choice for SMBs
sponsored by AlienVault
WHITE PAPER: In this analyst report, Javvad Malik of The 451 Group reviews AlienVault's non-traditional approach to SIEM. AlienVault's platform gives organizations of any size a solution that stands up to expensive, enterprise-level security products.
Posted: 11 Jul 2013 | Published: 25 Jan 2013

AlienVault

5 DNS Security Risks That Keep You Up At Night
sponsored by Dyn
WHITE PAPER: This guide explores 5 DNS security risks and what you can do to prevent them.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Dyn

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Limited
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Limited

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST: This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

Lumension

22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

451 Group Report on Federation Gateway Market & Cloud Access 360
sponsored by Intel
ANALYST REPORT: In this Market Insight Report, 451 Group Steve Coplan provides a comprehensive independent review of the Intel Expressway Cloud Access 360 federation gateway. Steve covers how Intel’s acquisition of Nordic Edge plays into Intel’s latest moves in the security sector.
Posted: 14 Mar 2011 | Published: 08 Mar 2011

Intel

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

4G: The What, Why and When
sponsored by Tellabs
WHITE PAPER: The purpose of this paper is to: Clarify the definition of 4G from a technology perspective; present business benefits of 4G-enabled services; and Propose a realistic timeline for the adoption of a 4G standard.
Posted: 23 Oct 2008 | Published: 23 Oct 2008

Tellabs

5 Backup Features to Ensure Compliance
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Cloud Security Concerns You Must Address
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett-Packard Company
26 - 50 of 3487 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement