IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Reports
 
Quantitative Analysis of a Prefabricated vs. Traditional Data Center
sponsored by Schneider Electric
WHITE PAPER: In this white paper, you will quantify the capital cost differences between prefabricated vs. traditional data centers, as well as learn why prefabrication does not come at a capex premium. Access this paper to discover the impact of rack density for both designs, and discover a side-by-side architecture comparison between prefab and "stick built".
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Schneider Electric

Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centered and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


The ABCs of CA Workload Automation
sponsored by CA Technologies
WHITE PAPER: The following white paper has been designed to help those companies utilizing workload automation recognize as many facets of this technology as possible. Access now and gain a better understanding of workload automation and ultimately discover how you can accomplish more than you may have thought possible.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to othe growing problems.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

The Key to Cloud Security Compliance: Optimizing Cloud Infrastructure Security Programs
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn why SaaS vendors bear a heavy compliance burden for cloud security. Access now to determine which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CloudPassage

IT Assist: Gaining efficiencies for Northern Ireland
sponsored by Hewlett-Packard Enterprise
VIDEO: In the following video case study, explore how the public sector in Northern Ireland was able to meet the growing complexity of computing needs by partnering with HPE Helion. Inside, see how they are now able to effectively scale their computing power needs, enable data efficient data access to everyone, and save big on infrastructure costs.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Solve Performance Issues Impacting Citrix-based Services with Real-Time Analytics
sponsored by Citrix and Netscout
TRANSCRIPT: In this transcript, you will explore service assurance challenges impacting IT professionals that manage critical business applications and unified communications (UC) by leveraging the network.. Get access now to discover how to gain a holistic view of the infrastructure to enable collaboration.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Citrix and Netscout

RA SSL Everywhere Infographic v1
sponsored by F5 Networks
RESOURCE: In this white paper, you will learn how SSL adoption has grown and continues to grow year over year and how cybercrime is forcing everyday sites like Facebook to quickly embrace SSL's. You will discover how you can beef up your security layers to stay ahead of ever-evolving threats.
Posted: 27 Jan 2016 | Published: 16 Dec 2015

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement