IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Reports
 
Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

ComputerWeekly.com

Reduce the Time it Takes to Resolve IT Issues and Restore IT Services With Communication Integration
sponsored by EverBridge Inc.
WHITE PAPER: In this white paper discover a program that lets you connect the right on-call personnel with the right information to get restoration done faster. Learn how you can get detailed report and incident notifications and responses, manage group and shift calendars from one place, and more.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

EverBridge Inc.

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: Uninterrupted access to Internet-based apps, data, and servers are crucial to a successful business. But how do you eliminate downtime that can get in the way? In this white paper, learn how NDFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

Building for Tomorrow with Open Server Architecture
sponsored by IBM
RESOURCE: Download this resource now to learn how open server architecture is transforming the data center landscape with collaboration across the stack, increasing flexibility through open community ecosystems. Take advantage of this architecture to realize deep integration of existing IT resources, and more.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

IBM

How ransomware can hold your business hostage
sponsored by Dell SonicWALL
WHITE PAPER: Delve into the modern malware threat landscape and gain a detailed understanding of how malware targets your company, how it works, why traditional methods fail to protect against it, and how to mitigate your risk.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Dell SonicWALL

Governing GPOs with a Layered Security Framework
sponsored by Quest
WHITE PAPER: Despite Group Policy Objects (GPOs), security measures can still be circumvented or disrupted. Access this whitepaper to learn how to implement a layered security architecture, preventing the wrong hands from tampering with critical GPOs.
Posted: 27 Feb 2017 | Published: 27 Feb 2016

TOPICS:  Security
Quest

Value Your Data: Invest for Innovation
sponsored by IBM
RESOURCE: Access this resource to gain the economic advantages from workloads that scale up dynamically and on-demand with an open IT architecture on Linux. With this infrastructure, learn how to achieve a 75% reduction in data center floor space, as well as higher performance per core.
Posted: 23 Feb 2017 | Published: 31 Dec 2015

IBM

Top 10 Factors that Ensure VDI Success
sponsored by Pure Storage
EBOOK: Virtual desktop infrastructure (VDI) and desktop as a service (DaaS) are being widely adopted throughout the industry, with many already running VDI on-premise. Access this e-book for the top 10 factors of a successful VDI strategy and why storage is a key component.
Posted: 21 Feb 2017 | Published: 30 Dec 2016

Pure Storage

Financial Crime Survey: Prioritizing Compliance, AML, and Fraud Detection
sponsored by BAE Systems
RESEARCH CONTENT: In this report, find out how financial crime prevention priorities are shifting, demonstrating that it's more important than ever to have a sound anti-money laundering (AML) system in place. Plus, discover how compliance regulations and app fraud are changing modern security management.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

BAE Systems

Office 365: Should You Allow Traffic to Bypass the Proxy?
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: When migrating to cloud-based Office 365 deployments, organizations are faced with the decision for its traffic to bypass the proxy or not. Learn the negatives of allowing Office 365 traffic to bypass the proxy and what to do about it.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Symantec & Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement