IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Single Sign-on Reports
 
How 15 Different SIEM Systems Performed
sponsored by IBM
WHITE PAPER: This report presents the results of an in-depth review of fifteen different SIEM products.
Posted: 26 May 2015 | Published: 01 Jul 2014

IBM

Government -OpenLegacy replaces old HTML emulation solution at the Israel Airport Authority with a modern web application
sponsored by Open Legacy
WHITE PAPER: Access this white paper to find out how IAA's engineers developed a dedicated mobile application to handle all aspects of security personnel management, including shift planning and assignment.
Posted: 29 May 2015 | Published: 31 Jan 2015

Open Legacy

How to Ensure Effective and Secure Solutions Using Data Center Providers
sponsored by CyrusOne
CASE STUDY: This case study explains why SmartVault chose one particular data center provider to host its IT footprint.
Posted: 27 May 2015 | Published: 27 May 2015

CyrusOne

How SaaS Apps are Reshaping the Face of IT
sponsored by Matrix42
EGUIDE: In this e-guide, learn how to make mobile app dev platforms, management suites, and backup products work together. In addition, discover top tips for making SaaS integration an on-going IT priority.
Posted: 19 May 2015 | Published: 19 May 2015

Matrix42

Getting Better Decisions and Instant Action from Your Big Data
sponsored by TIBCO Software Inc.
WHITE PAPER: In this white paper, discover how advanced data integration via enterprise service bus architecture can speed up your big data analytics.
Posted: 20 May 2015 | Published: 31 Dec 2014

TIBCO Software Inc.

Checklist: Online Security Strategy Key Considerations
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides readers with a checklist designed to help assess your approach to online security and identify if there are any areas of your strategy that require reevaluation. Access now and gain a firm grasp on your online security strategy and learn what steps you can take to improve it.
Posted: 18 May 2015 | Published: 18 May 2015

Melbourne IT

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

Do BYOD Users Have Too Much Corporate Data Access?
sponsored by Dell, Inc. and IntelĀ®
EGUIDE: Access this expert guide to learn how you can deploy powerful, secure mobile apps while controlling data access with mobile content management (MCM).
Posted: 15 May 2015 | Published: 15 May 2015

Dell, Inc. and IntelĀ®

Consolidate digital identities, devices, SaaS, apps and workflows with the cloud
sponsored by Matrix42
WHITE PAPER: This informative white paper reveals a solution that can help you enterprise perform at the top of its game through consolidation.
Posted: 15 May 2015 | Published: 15 May 2015

Matrix42

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement