IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
51 - 75 of 5542 Matches Previous Page  |  Next Page
2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

2016 DevOps Salary Report
sponsored by Puppet
RESEARCH CONTENT: This report examines the results of the 2016 State of DevOps Report, particularly in connection with data collected on salaries. Access now so you can see how your own salary stacks up against others in your region and industry.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Puppet

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

2016 IT Skills and Salary Report
sponsored by Global Knowledge
ANALYST REPORT: The annual Global Knowledge IT Skills and Salary Report is here. Our comprehensive report draws data from over 10,000 North American respondents where we provide insight into salary trends, must-have skills and sought-after certifications. Don't miss an opportunity to start future-proofing your career today.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Global Knowledge

2016 Security Pressures Report
sponsored by SingTel
WHITE PAPER: The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

2016 State of DevOps Report
sponsored by Puppet
RESEARCH CONTENT: Discover how DevOps tools, practices, and cultural values are affecting IT teams and the organizations they serve. Plus, uncover 6 key findings from a comprehensive survey of thousands of technical professionals and learn how they can help you better understand the potential impact of DevOps in your organization.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

Puppet

2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

2017 IT Priorities ANZ Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Each year, Computer Weekly asks CIO and senior IT decision-makers in Australia/New Zealand what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for 2017.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

ComputerWeekly.com

2017 IT Priorities APAC Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Each year, Computer Weekly asks CIOs and senior IT decision-makers throughout APAC what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for 2017.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

ComputerWeekly.com

2017 IT Priorities ASEAN Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Each year, Computer Weekly asks CIOs and senior IT decision-makers in ASEAN what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for 2017.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

ComputerWeekly.com

2017 Security Protection: 7 Threat Predictions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Access this infographic and accompanying videos to learn the top 7 security threat predictions for 2017. Discover the rise of the Ransomworm, IaaS as both attack platform and surface, botnets targeting IoT devices, and more.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

WatchGuard Technologies, Inc.

3 Areas Where Healthcare Providers Need Your MSP Expertise
sponsored by Solarwinds N-able
EBOOK: The healthcare market represents a huge opportunity for managed services providers (MSPs), and analysts predict this trend will continue to expand for years to come. Access this eBook to learn about healthcare information technology needs and how to meet them.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Solarwinds N-able

3 File Transfer Mistakes that Could Be Costing You and Putting Data at Risk
sponsored by Globalscape
WHITE PAPER: IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Globalscape

2016 Connected Enterprise Report
sponsored by Dimension Data
WHITE PAPER: Discover the trends, insights and strategies that leading companies are using to collaborate better in the digital age.
Posted: 12 May 2016 | Published: 12 May 2016

TOPICS:  IT Management
Dimension Data

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: United Kingdom
sponsored by IBM
ANALYST REPORT: Learn the true cost of a data breach in 2016. Obtain detailed knowledge of not only the monetary costs of a major data breach but also the details of lost business, 7 global megatrends in the cost of data breach research, and the biggest implications for your organization.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

IBM

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

2016 State of Crowdsourced Innovation
sponsored by Spigit
WHITE PAPER: Read this report to discover the 2016 landscape of crowdsourced innovation, highlighting essential best practices for running sustainable innovation programs. Download now to learn why enterprises are tapping crowdsourcing as a way to innovate, and what returns you should expect.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Spigit

2016 Veeam Availability Report
sponsored by Veeam Software
WHITE PAPER: To satisfy the ever demanding user, businesses must become always-on enterprises with 24/7/265 availability to their users. With hands tied, it's hard for IT managers to achieve this with pressure to perform under tight budgets. Access this white paper to learn about the true scope of these issues and how they should be addressed.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

24 Experts Share Their Network Security Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, 24 experts reveal their network security secrets. Uncover recommendations on the 5 major security areas that require more attention now than ever.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

3 Bad Mistakes that will Sabotage Your ITSM Program
sponsored by ServiceNow
EGUIDE: This expert e-guide covers three crucial mistakes you must avoid for IT service management implementation and details how one company made ITSM fun.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ServiceNow

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

3 Components in Securing the Software-Defined Data Center
sponsored by Intel Security
WHITE PAPER: The SDDC provides benefits for enterprise IT. Meet cloud security demands while expanding visibility and protection.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

3 Hybrid Cloud Advantages and 5 Tips to Reduce Hybrid Cloud Latency
sponsored by Hewlett Packard Enterprise
EGUIDE: If you're sick of being stuck in the fog, hybrid cloud gives you the freedom to decide how much public and private cloud you'd like to use. This e-guide explains three advantages of hybrid cloud that have been flying under the radar and also learn five factors to consider in order to reduce hybrid cloud latency.
Posted: 01 Jul 2016 | Published: 16 Jun 2016

Hewlett Packard Enterprise
51 - 75 of 5542 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement