IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Reports
 
Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Learn how to deploy a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

How to Tackle the Three Biggest Barriers to Business Mobility
sponsored by Citrix
WHITE PAPER: 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

European Perceptions, Preparedness and Strategies for IoT Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Securing the Cloud for the Modern Enterprise
sponsored by OneLogin
EBOOK: In this extensive, 47-page e-book explore how identity management can streamlines access to the cloud while protecting corporate data, reducing dependence on IT, and minimizing disruption.
Posted: 19 Jul 2017 | Published: 13 Jul 2017

OneLogin

How to Build (and Scale) with Microservices
sponsored by AppDynamics
EBOOK: Read this e-book to gain an in-depth look on the essentials of microservices, encapsulated in four short chapters, which include, how microservices differ from service-oriented architecture, obstacles in visibility and monitoring after migration, and more.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

AppDynamics

DaaS Provider Evaluation Checklist
sponsored by Dizzion
WHITE PAPER: With so many options and vendors out there, researching desktop as a service (DaaS) can be a time consuming task. What questions should you ask? What should you be evaluating? Download this checklist to gain a real-world, hands-on tool to use to make the information gathering process easier.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Dizzion

Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.
Posted: 13 Jul 2017 | Published: 31 Jul 2015

Symantec & Blue Coat Systems

CEO Fraud Prevention Manual
sponsored by KnowBe4
WHITE PAPER: This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

KnowBe4

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 17 Jul 2017 | Published: 28 Apr 2017

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement