IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
51 - 75 of 4352 Matches Previous Page  | Next Page
3 Keys to a Modern IT Infrastructure
sponsored by IBM
WHITE PAPER: Access this white paper to find out why it is imperative for enterprise IT infrastructures to adapt to modern challenges by utilizing cloud computing and taking new approaches to analytics and security.
Posted: 06 Dec 2012 | Published: 07 May 2013

IBM

3 Steps to Harnessing the Cloud to Enable Business in the Nick of Time
sponsored by SAVVIS
WHITE PAPER: Previous IT best practices provisioned a certain amount of money and space to physical IT infrastructure. Learn how the cloud is changing the way we understand IT infrastructure in this white paper.
Posted: 02 Aug 2013 | Published: 01 Aug 2012

SAVVIS

3 Threats to Cloud Data, and How to Address Them
sponsored by CipherCloud
RESOURCE: In this resource, uncover the three major threats to cloud computing according to the Cloud Security Alliance, and learn about the best ways to protect your organization against malicious threats.
Posted: 24 Sep 2014 | Published: 03 Jul 2014

CipherCloud

3 Ways to Secure Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

4 Steps to Meet Growing IT Demands
sponsored by Rackspace
WHITE PAPER: In this informative resource, gain critical insights into a new "service broker" model of IT operations that can provide end users with faster service, enable IT teams to undertake more strategic projects, and allow management to see more clearly IT's business contributions.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Rackspace

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

451 Research Report: Cloud Management Platforms: A Comparison of Product Categories
sponsored by Scalr
WHITE PAPER: This resource explains the emergence of CMPs, as well as their capabilities that support a specific audience.
Posted: 08 Oct 2014 | Published: 30 Sep 2014

Scalr

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

5 DNS Security Risks That Keep You Up At Night
sponsored by Dyn
WHITE PAPER: This guide explores 5 DNS security risks and what you can do to prevent them.
Posted: 20 Jun 2014 | Published: 08 Jan 2014

Dyn

5 Easy Steps to a High Performance Cluster
sponsored by IBM
WHITE PAPER: Explore this in-depth whitepaper to discover the 5 easy steps to designing and constructing a high performance computing cluster. Learn what a cluster is, and why you should utilise such a design strategy within your own infrastructure.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

IBM

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett-Packard Company

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale

3 Quick Tips for a Software-Defined Data Center Strategy
sponsored by VMware, Inc.
EGUIDE: This e-guide presents three expert tips to creating a software-defined data center strategy.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

VMware, Inc.

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

451 Group Report on Federation Gateway Market & Cloud Access 360
sponsored by Intel
ANALYST REPORT: In this Market Insight Report, 451 Group Steve Coplan provides a comprehensive independent review of the Intel Expressway Cloud Access 360 federation gateway. Steve covers how Intel’s acquisition of Nordic Edge plays into Intel’s latest moves in the security sector.
Posted: 14 Mar 2011 | Published: 08 Mar 2011

Intel

451 Group Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This report analyzes where AlienVault fits into the SMB security market. Read on for descriptions of products that AlienVault offers and considerations surrounding the main strengths, weaknesses, opportunities and threats facing the organization in relation to its competitors.
Posted: 05 May 2014 | Published: 26 Mar 2014

AlienVault

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

4G: The What, Why and When
sponsored by Tellabs
WHITE PAPER: The purpose of this paper is to: Clarify the definition of 4G from a technology perspective; present business benefits of 4G-enabled services; and Propose a realistic timeline for the adoption of a 4G standard.
Posted: 23 Oct 2008 | Published: 23 Oct 2008

Tellabs

5 Cloud Security Concerns You Must Address
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett-Packard Company

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix
51 - 75 of 4352 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement