IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
51 - 75 of 5793 Matches Previous Page  |  Next Page
2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

2016 Data Protection Vertical Industry Findings
sponsored by Intel Security
WHITE PAPER: Did you know 68% of breaches require public disclosure? Understand the trends related to data loss.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

TOPICS:  IT Management
Intel Security

2016 Defense Report Cyberthreat for Financial Services
sponsored by Imperva
RESOURCE: This infographic succinctly lays out the state of affairs for IT security in the financial industry. Access now to see exactly how finance stacks up against other industries when it comes to securing users, applications, and infrastructure.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Imperva

2016 Defense Report Cyberthreat for Healthcare
sponsored by Imperva
RESOURCE: This infographic succinctly lays out the state of affairs for IT security in the healthcare industry. Access now to see exactly how healthcare stacks up against other industries when it comes to securing users, applications, and infrastructure.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

Imperva

2016 DevOps Salary Report
sponsored by Puppet
RESEARCH CONTENT: This report examines the results of the 2016 State of DevOps Report, particularly in connection with data collected on salaries. Access now so you can see how your own salary stacks up against others in your region and industry.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Puppet

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

2016 Global Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Global Server Hardware, Server OS Reliability Report
sponsored by SAP/Lenovo/Intel
ANALYST REPORT: Explore the findings of the ITIC's 2016 Global Server Hardware and Server OS Reliability Survey, and discover what executives and IT managers from over 600 organizations are saying about the most common causes of downtime—and the most reliable servers on the market.
Posted: 09 Sep 2016 | Published: 31 Jul 2015

SAP/Lenovo/Intel

2016 IT Skills and Salary Report
sponsored by Global Knowledge
ANALYST REPORT: The annual Global Knowledge IT Skills and Salary Report is here. Our comprehensive report draws data from over 10,000 North American respondents where we provide insight into salary trends, must-have skills and sought-after certifications. Don't miss an opportunity to start future-proofing your career today.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Global Knowledge

2016 Mobile Applications Security Update
sponsored by Appthority
RESOURCE: Here's a comprehensive review of 2 major vulnerability types surfacing in Android apps: autorooting and overlay malware. Plus get analysis on whether Apple's faster app review times coincided with vulnerabilities that have plagued the App Store. And if that weren't enough, find out if the revised Android permissions model makes their apps safer.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Appthority

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

2016 Security Trends and Predictions
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.
Posted: 22 Aug 2016 | Published: 04 Dec 2016

Juniper Networks, Inc.

2016 State of DevOps Report
sponsored by Puppet
RESEARCH CONTENT: Discover how DevOps tools, practices, and cultural values are affecting IT teams and the organizations they serve. Plus, uncover 6 key findings from a comprehensive survey of thousands of technical professionals and learn how they can help you better understand the potential impact of DevOps in your organization.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

Puppet

2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

2016 State of Storage for Virtualized Enterprises
sponsored by Tintri
WHITE PAPER: This year, 49% of respondents to a State of Storage study declared manageability their biggest concern – a 10% jump from last year! With virtualization changing the way we manage storage, numerous pains have popped up. Access this white paper to reap knowledge from feedback on these pains and concerns.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

Tintri

2016 Survey: Wireless Security Trends
sponsored by Fortinet, Inc.
RESOURCE: Learn what 1300 IT decision makers have to say about the state of wireless security. Access now for insights into the top security risks, the position of wireless as the most vulnerable part of the network, and what IT leaders are doing to protect enterprise systems.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Fortinet, Inc.

2016 Connected Enterprise Report
sponsored by Dimension Data
WHITE PAPER: Discover the trends, insights and strategies that leading companies are using to collaborate better in the digital age.
Posted: 12 May 2016 | Published: 12 May 2016

TOPICS:  IT Management
Dimension Data

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: United Kingdom
sponsored by IBM
ANALYST REPORT: Learn the true cost of a data breach in 2016. Obtain detailed knowledge of not only the monetary costs of a major data breach but also the details of lost business, 7 global megatrends in the cost of data breach research, and the biggest implications for your organization.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

IBM

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

2016 State of Crowdsourced Innovation
sponsored by Spigit
WHITE PAPER: Read this report to discover the 2016 landscape of crowdsourced innovation, highlighting essential best practices for running sustainable innovation programs. Download now to learn why enterprises are tapping crowdsourcing as a way to innovate, and what returns you should expect.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Spigit
51 - 75 of 5793 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement