IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSOReports
76 - 100 of 4053 Matches Previous Page  | Next Page
5 Things Your Organization Can Do Today to Improve Security
sponsored by CDW Corporation
WHITE PAPER: This informative resource contains insights from a security assessment professional on the problematic patterns that he has observed within a wide variety of organizations, as well as their simple but critical solutions.
Posted: 22 Jul 2014 | Published: 04 Apr 2014

CDW Corporation

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

5 Ways That MSPs Can Capitalize on Cloud Opportunities
sponsored by ConnectWise
WHITE PAPER: This insightful white paper details how MSPs can ensure the continued success of their businesses as the popularity of cloud computing continues to grow by offering the kind of indispensible personalized support to their clients that cloud giants can't provide.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

5 Ways to Satisfy Both Business and User Demands for IT Service
sponsored by CA Technologies.
WHITE PAPER: This whitepaper details five steps you must take in order to provide the IT service your end-users want at the cost your business demands.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Ways to Expand Your Managed Services Offering and Boost Revenue
sponsored by LabTech Software
EBOOK: To remain relevant in the world of IT today, you need to think big. Access this eBook today, which introduces six must-have services that will boost your bottom-line and provide far-reaching benefits to your clients.
Posted: 31 Jan 2014 | Published: 31 Dec 2013

LabTech Software

7 Ideas to Improve Network Security in Healthcare
sponsored by Palo Alto Networks
WEBCAST: View this webcast to reveal 7 critical steps to improve healthcare IT security despite increasing network complexities.
Posted: 27 Dec 2013 | Premiered: Sep 30, 2013

Palo Alto Networks

7 Key Trends in the Business of Tech
sponsored by K2
WHITE PAPER: This paper addresses 7 key trends in the business of tech today, from business acceleration to the consumerization of IT. Learn how you can capitalize on these trends with business application software that has 4 key capabilities.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

K2

7 Steps for Developing an Air-Tight Cloud Security Plan
sponsored by NaviSite, Inc.
WHITE PAPER: Find seven steps your organization can take in order leverage cloud services cost-effectively and securely. Read on to learn more.
Posted: 11 Feb 2014 | Published: 27 Sep 2013

NaviSite, Inc.

7 Ways to Tell if an Incident Response Service Provider is Right for You
sponsored by Dell SecureWorks UK
WHITE PAPER: View this white paper to learn more about how you can find the right incident response service provider. It outlines how to determine the vendor's capabilities and if the vendor represents the best fit based on your organizations unique needs.
Posted: 28 May 2013 | Published: 28 May 2013

Dell SecureWorks UK

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Essential Tips to Ensure Success with RM
sponsored by Jama Software
WHITE PAPER: A company’s overall success largely relies on the software team’s success. Organizations that embrace this concept experience less frustration, fewer errors, and faster planning and development cycles. Read this guide to learn about seven essential tips to help you be more successful with requirements management and software development.
Posted: 08 Dec 2009 | Published: 18 Aug 2011

Jama Software

7 Keys to Success for Managing a Business-Critical Cloud with Confidence
sponsored by Hewlett-Packard Company
WHITE PAPER: Need a few tips on how to manage your cloud infrastructure? Here are seven best practices that will keep your business-critical cloud environment up and running.
Posted: 01 May 2012 | Published: 26 Apr 2012

Hewlett-Packard Company

7 Stages Of Advanced Threats Cyber Attack Kill Chain
sponsored by Websense
WHITE PAPER: This important resource examines the seven stages of advanced threats, discussing in-depth how your organization can best protect itself and what tools are needed to keep your critical information safe.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Websense

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

7 Vital Tips for Video Meetings Sales Success
sponsored by IBM
WHITE PAPER: This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Posted: 24 Feb 2011 | Published: 29 Jan 2013

IBM

8 Common Mistakes of Windows 7 Migration
sponsored by Dell, Inc.
WEBCAST: Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program
Posted: 15 Apr 2011 | Premiered: Apr 27, 2011, 12:00 EDT (16:00 GMT)

Dell, Inc.

8 Questions You Should Ask About Linux Systems Management
sponsored by Red Hat and JBoss
WHITE PAPER: IT organizations are always looking for ways to save money and time without compromising on issues like security or compliance. Exploring the value of your systems management solution is a lot easier when you know the right questions to ask. We have a few suggestions for how to get started.
Posted: 29 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss
76 - 100 of 4053 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement