IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Single Signon, Enterprise Single Sign-on, Single Sign On, Single Sign-on
DEFINITION: Single sign-on (SSO)is a session/user authenticationprocess that permits a user to enter one name and password in order to accessmultiple applications. The process authenticates the user for all theapplications they have been given rights to and eliminatesfurther prompts when they switch applications duringa particular session.
SSO Reports
1 - 25 of 71 Matches Previous Page  |  Next Page
Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

Specification IAM Server Control
sponsored by FoxT
WHITE PAPER: This white paper teaches you how to enable holistic identity management, strong authentication, granular control, and SSO for users while mitigating unwanted access.
Posted: 17 Dec 2015 | Published: 02 Dec 2015

FoxT

Password Hacking: Are You Safer in the Cloud?
sponsored by Dashlane Inc.
WHITE PAPER: This white paper teaches you how to secure your password management strategy in the cloud in 3 simple steps. Continue reading to learn why you need to kill simple password rules and how to adapt to cloud authentication and access.
Posted: 15 Dec 2015 | Published: 08 Dec 2015

Dashlane Inc.

Secure Centralized Identity and Password Management
sponsored by Dashlane Inc.
WEBCAST: In this webcast, learn how to safely centralize all login credentials for users on their own desktops and mobile devices.
Posted: 07 Dec 2015 | Premiered: Nov 11, 2015

Dashlane Inc.

Why SaaS Security is Hotter than Ever
sponsored by IBM
WHITE PAPER: Access this research reprint to get the latest in multifaceted SaaS security products that decision-makers can expect to see in the near future, and learn ways to embrace SaaS apps without bringing in loads of point products to secure them.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

Making Sign-on Simple and Secure
sponsored by Radiant Logic, Inc.
EBOOK: Single sign-on has a complicated history. This technical guide brings you up to date on how the main protocols for single sign-on -- OpenID and Security Assertion Markup Language (SAML) -- compare and how they can be connected to the pieces you already have. While SAML seems to be winning the field, OpenID shouldn't be ruled out.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Security | SSO
Radiant Logic, Inc.

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

What is an Identity Provider and Why Do I Need to Become One
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Office 365: Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.
1 - 25 of 71 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
SSO White Papers | SSO Multimedia | SSO IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement