IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed   
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO White Papers (View All Report Types)
1 - 25 of 2697 Matches Previous Page  |  Next Page
10 Essential Capabilities of a Modern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

10 Essential Kpis For The It Strategic Planning Process
sponsored by Apptio
WHITE PAPER: IT strategic plans need key performance indicators (KPIs) that show financial fundamentals, delivery, innovation, and agility to support the business strategy. These aren’t just operational measures – they are proof that IT is delivering business value. Open up this white paper to find ten essential KPIs for the strategic IT planning process.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  IT Management
Apptio

10 Steps To Aiops Success
sponsored by OpsRamp
WHITE PAPER: AI in IT operations is incredibly useful; AIOps can help reduce alert noise, analyze data for the IT team, and automatically run menial tasks like patches and updates. But while most businesses are planning to invest in AIOps, not all of these businesses are adequately prepared. Read this white paper to learn the 10 steps toward AIOps success.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

OpsRamp

11 Recommended Security Practices to Manage the Container Lifecycle
sponsored by VMware Tanzu
WHITE PAPER: Development, security, and operations leaders all share a common concern: application security across the software development lifecycle. The problem is, no team wants to fully claim this challenge as their own. Download this guide to learn about 11 security practices that everyone can get behind.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

VMware Tanzu

11 Required Monitoring Platform Capabilities for Enterprise DevOps Teams
sponsored by Datadog
WHITE PAPER: As DevOps teams work with an unprecedented volume of data, effective end-to-end monitoring is a key capability for any DevOps initiative. Here, explore the 11 required monitoring platform capabilities for enterprise DevOps teams. Download it here.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Datadog

10 Best Practices For Reducing Spend In AWS
sponsored by CloudHealth by VMware
WHITE PAPER: Access these 10 proven best practices for cost reduction and optimization in Amazon Web Services (AWS).
Posted: 27 Nov 2018 | Published: 27 Nov 2018

TOPICS:  IT Management
CloudHealth by VMware

10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Learn from your peers. Compare these 10 common mistakes to your incident response practices to improve effectiveness.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Reasons LinuxONE is the Best Choice for Linux Workloads
sponsored by IBM
WHITE PAPER: Here's a freebie: Linux applications on x86 servers is 65% more expensive than on LinuxONE servers. Read on for 10 more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

TOPICS:  IT Management
IBM

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

100+ Million Cameras – AI and Video are Changing the Edge
sponsored by Western Digital
WHITE PAPER: Learn how the drastic increase in network cameras and use of AI is causing organizations to rethink their edge architectures.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TOPICS:  IT Management
Western Digital

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

15 Popular IT and Business Certifications
sponsored by Global Knowledge
WHITE PAPER: This report reviews the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

20 Reasons to Move Backup and Disaster Recovery to the Cloud
sponsored by Druva
WHITE PAPER: Cloud-based platforms are the way of the future. Gain these 20 business benefits when choosing a unified cloud solution.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

2013 Impact Awards Reveal Industry Top Players
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM
1 - 25 of 2697 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences