IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Single Sign On

RSS Feed    Add to Google    Add to My Yahoo!
Single Sign OnReports
 
Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

Five Steps to Secure Internet Single Sign-On (SSO)
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on.
Posted: 05 Jun 2009 | Published: 05 Jun 2009

Ping Identity Corporation

Reinforce Business Objectives and Achieve ROI with Internet Identity Security
sponsored by Ping Identity Corporation
WHITE PAPER: Read this white paper to learn how after deploying PingFederate or PingConnect your organization will yield a high return on investment and run more efficiently and will have distinct competitive advantage over companies that do not leverage Internet Identity Security Software.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Ping Identity Corporation

Protecting and simplifying access to Electronic Health Records
sponsored by DigitalPersona, Inc
WHITE PAPER: Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

DigitalPersona, Inc

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management
sponsored by RSA, The Security Division of EMC
CASE STUDY: Xellerate®, combined with RSA ClearTrust® software, provides a comprehensive solution that delivers centralized authentication and secure access management as well as user self-service and workflow capabilities.
Posted: 09 Jun 2004 | Published: 07 Jun 2004

RSA, The Security Division of EMC

Strategies for Enhancing the Clinician’s Workstation Productivity
sponsored by Siemens
WHITE PAPER: Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Siemens

451 Group Report on Federation Gateway Market & Cloud Access 360
sponsored by Intel
ANALYST REPORT: In this Market Insight Report, 451 Group Steve Coplan provides a comprehensive independent review of the Intel Expressway Cloud Access 360 federation gateway. Steve covers how Intel’s acquisition of Nordic Edge plays into Intel’s latest moves in the security sector.
Posted: 14 Mar 2011 | Published: 08 Mar 2011

Intel

Securing WLANs with Two-factor Authentication
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA, The Security Division of EMC

Security Assertion Markup Language (SAML) - the Essential Guide
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Ping Identity Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement