IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed   
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO White Papers (View All Report Types)
151 - 175 of 3651 Matches Previous Page  |  Next Page
6 Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: 42% of cyber security professionals say their organization ignores a significant number of security alerts because they can't keep up with the volume, according to Enterprise Strategy Group. This white paper discloses 6 steps for building a robust incident response function to ensure your organization keeps up with the high security alert volume.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

IBM

6 Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: 42% of cyber security professionals say their organization ignores a significant number of security alerts because they can't keep up with the volume, according to Enterprise Strategy Group. This white paper discloses 6 steps for building a robust incident response function to ensure your organization keeps up with the high security alert volume.
Posted: 16 May 2018 | Published: 01 May 2018

IBM

6 Steps to Building a Business Case for Enterprise Architecture
sponsored by Mega International
WHITE PAPER: You know that your company could improve, but how do you build the case that will get your executives to provide the necessary funding? This white paper covers the six steps you need to take in order to build the strongest possible case for using enterprise architecture to transform your business.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Mega International

6 Steps to Building a Business Case for IT Portfolio Management
sponsored by Mega International
WHITE PAPER: Uncover 6 steps to build a business case for IT portfolio management by examining how it helps your organization beyond just delivering cost savings.
Posted: 05 Jan 2018 | Published: 05 Jan 2018

Mega International

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

7 Critical Factors for an Optimized IAM Security Investment
sponsored by Edgile
WHITE PAPER: With security breaches dominating the headlines, CISOs find themselves fighting fires, rather than strategically planning. This resource offers a strategy-first approach allowing CISOs to build better long term investments and stay more secure.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Edgile

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

7 Reasons Why IT Leaders Want to Improve Data Protection and BitLocker Management
sponsored by WinMagic
WHITE PAPER: Discover 7 reasons why IT leaders are looking at increasingly intelligent ways to protect their data and improve BitLocker management with a centralized approach to encryption.
Posted: 09 May 2018 | Published: 09 May 2018

WinMagic

7 Step Guide to Risk & Compliance
sponsored by Signavio
WHITE PAPER: How can you be sure your organization is safeguarding its future? Click to learn the seven steps that go into forming a rock solid risk and compliance strategy, and how to keep your business ready for any future changes.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

Signavio

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

5 Ways Veritas Makes VMware vSphere Backup Rock!
sponsored by Veritas
WHITE PAPER: Learn five ways to simplify and transform the protection of your VMware physical and cloud environments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

5 Ways Veritas NetBackup 8 Makes Microsoft Hyper-VBackup Rock!
sponsored by Veritas
WHITE PAPER: Discover how to achieve near 100% backup and recovery success rates in a Hyper-V environment.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

6 Critical Criteria for Small Business Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper reviews both the unique pain points faced by small businesses in regards to data protection, as well as the solution provided by Datto ALTO, the first backup and disaster recovery (BDR) solution designed specifically for small business with the power of an enterprise BDR.  And at a small business price point.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Datto, Inc.

6 Questions to Ask SaaS E-Commerce Vendors
sponsored by Oracle Corporation
WHITE PAPER: Don't just look at bells and whistles. Learn strategic questions to ask that ensure you find the best partner in SaaS.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

6 Reasons to Boot Enterprise Servers From Enhanced SSD
sponsored by Micron Technology
WHITE PAPER: Choosing between HDD and SSD as you build your server? Find out how SSD creates better resiliency, lower costs and more.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

TOPICS:  IT Management
Micron Technology

6 Steps to Mastering Endpoint Protection
sponsored by McAfee, Inc.
WHITE PAPER: Let these six steps guide your company towards reliable protection to stay ahead of attackers.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Tomorrow's workloads will be even heavier than today's. Learn how to future-proof your server to scale as demand grows.
Posted: 11 Mar 2015 | Published: 31 Jan 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Benefits You Realize with a Holistic Data Protection Approach
sponsored by Commvault
WHITE PAPER: Legacy recovery can't handle today's 24/7 environment. Discover an approach that lets you better understand your data.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

TOPICS:  IT Management
Commvault

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Essential Tips to Ensure Success with RM
sponsored by Jama Software
WHITE PAPER: A company’s overall success largely relies on the software team’s success. Organizations that embrace this concept experience less frustration, fewer errors, and faster planning and development cycles. Read this guide to learn about seven essential tips to help you be more successful with requirements management and software development.
Posted: 08 Dec 2009 | Published: 18 Aug 2011

Jama Software

7 Keys to Success for Managing a Business-Critical Cloud with Confidence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Need a few tips on how to manage your cloud infrastructure? Here are seven best practices that will keep your business-critical cloud environment up and running.
Posted: 01 May 2012 | Published: 26 Apr 2012

Hewlett Packard Enterprise

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by Commvault
WHITE PAPER: Can your email archiving strategy meet your long-term goals? Find out with these 7 warning signs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Commvault

7 Reasons Why Appliances Improve Your Backup Infrastructure
sponsored by Veritas
WHITE PAPER: Discover how using an appliance for backup and recovery simplifies IT processes and reduces costs.
Posted: 29 Mar 2017 | Published: 29 Mar 2017

TOPICS:  IT Management
Veritas
151 - 175 of 3651 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement