IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Single Signon

RSS Feed    Add to Google    Add to My Yahoo!
Single SignonReports
 
HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

Get the Low Down on Transferring Files With Desktop Transfer Client
sponsored by GlobalScape
WHITE PAPER: In this white paper, explore a desktop file transfer solution that only requires Internet connection and offers increased flexibility in file sharing without added costs.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Using SAML for Identity Management
sponsored by Forum Systems
WHITE PAPER: Check out this white paper to discover why federated identity management is essential for controlling access to applications across multiple different domains.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Forum Systems

Considerations for enterprise mobile access and SSO technology
sponsored by Centrify Corporation
EGUIDE: This expert E-Guide offers access management tips and best practices in the age of the cloud and mobility. Learn how you can deliver single sign-on (SSO) to enable safe access, and uncover considerations for two-factor mobile authentication by reading on.
Posted: 22 Feb 2013 | Published: 22 Feb 2013

Centrify Corporation

Integrating Unix and Linux Systems with Active Directory
sponsored by Dell Software
TECHNICAL ARTICLE: Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Internet-Scale Identity Systems: An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Ping Identity Corporation

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement