IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Reports
 
A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

ITSM Blueprint: Accelerate Service Delivery with Automation
sponsored by ServiceNow
EBOOK: Are manual processes draining productivity—and straining your reputation? Discover how ITSM automation can significantly alleviate your service desk difficulties. Read on to determine key performance indicators that will help you assess, improve, and demonstrate the impact of your automation efforts over time.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

ServiceNow

Improve Business Decisions with Predictive Analytics in the Cloud
sponsored by IBM
VIDEO: Access this video to learn how you can generate predictive intelligence in the cloud without putting more strain on your IT department. Get the integrated capabilities you need to build and deploy cloud-based predictive models to unlock flexible, real-time analytics and enhance decision-making.
Posted: 26 Jul 2016 | Premiered: 16 Jul 2015

IBM

What Are Your Data Center Initiatives?
sponsored by Dell, Inc.
EGUIDE: Explore the difficulties of keeping a data center up and running and discover how to leverage converged infrastructure to make this feat a breeze.
Posted: 18 Jul 2016 | Published: 06 Jul 2015

Dell, Inc.

Disrupting in the Digital Economy with an API Strategy
sponsored by IBM
WEBCAST: This webcast explores the use of an integrated creation, runtime, management, and security foundation for enterprise grade APIs and microservices. Unlock the value of existing IT investments to speed up development time, power modern digital apps, and expand brand reach.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016

IBM

Going global: Get up and running quickly no matter where you need to go
sponsored by Infor
WHITE PAPER: Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Read on to find out how such an approach has increased massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

The Benefits of Using an Appliance to Simplify and Accelerate Desktop Virtualization Initiatives
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Discover the market forces spurring the growing demand for desktop virtualization, explore the advantages an appliance has on desktop virtualization deployments, and learn what fundamentals to look for in a desktop virtualization appliance.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Dell, Inc. and Intel®

Implementing Data Privacy Requirements For Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover how to give visibility to encrypted traffic, reducing the risk of malicious activity to go unnoticed. Also find out how to achieve simple, effective policy enforcement.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement