IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Reports
 
NetApp Delivers Secure, Seamless Virtualized Desktops and Applications for Nearly 10,000 Users in 12 Days
sponsored by VMware
CASE STUDY: Faced with wanting to increase employee productivity and flexibility while protecting intellectual property and centrally managing desktops and apps, NetApp, a leader in the data storage industry, deployed a virtual desktop environment. Find out the benefits they realized from this approach.
Posted: 19 Aug 2016 | Published: 31 Dec 2015

VMware

Kingston University Transforms Student Learning Experience with Mobile Working and BYOD using VDI
sponsored by VMware
CASE STUDY: Learn how Kingston University implemented a virtual desktop environment to allow users to access apps and other learning tools from any device, from any location while helping IT to streamline the desktop maintenance processes.
Posted: 19 Aug 2016 | Published: 31 Dec 2015

VMware

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

How Banks Secure Conversations with their Most Valued Customers
sponsored by NICE Systems, Inc
WHITE PAPER: Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

NICE Systems, Inc

Secure Access for Retail
sponsored by Fortinet, Inc.
RESOURCE: The wireless network must become a springboard to exploit new technologies without adding to the security risks. This resource highlights how the retail industry can offer Wi-Fi internet to their customers without fear of security failures.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

AlienVault

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

10 Reasons to Archive Your Email in the Cloud
sponsored by LogicNow
WHITE PAPER: Discover 10 reasons why archiving your email in the cloud can give your enterprise an edge, including: hit the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

Bullet-proofing Office 365 Email
sponsored by LogicNow
WHITE PAPER: Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogicNow

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement