IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-onReports
 
Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

Evolving Security for a Maturing Cloud
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: Join ISACA and TechTarget for a virtual seminar on December 9th and come away with insight into the risks, strategies, and solutions that comprise the current cloud security landscape.
Posted: 22 Oct 2014 | Premieres: 09 Dec 2014

SearchSecurity.com

Prefabricated Data Center Modules Provide Predictable Performance
sponsored by Schneider Electric
VIDEO: This video examines how combining a high level of integration together with factory assembly and testing enables Schneider Electric's prefabricated data center modules to take a lot of the guesswork out of designed facility performance.
Posted: 30 Oct 2014 | Premiered: 13 Jan 2014

Schneider Electric

DDoS Malware
sponsored by Verisign, Inc.
WHITE PAPER: Check out this valuable whitepaper now to learn about five specific types of DDoS attacks, how they work, what you can do to prevent them, and much more.
Posted: 28 Oct 2014 | Published: 09 Oct 2013

Verisign, Inc.

Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0
sponsored by RSA, The Security Division of EMC
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA, The Security Division of EMC

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement