IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on White Papers (View All Report Types)
 
6 Steps You Can Take to Optimize Defensive Security
sponsored by Ixia - Keysight
WHITE PAPER: Bad actors have access to low cost, high impact security attack tools. You need to be able to play both defense and offense to keep up the defenses against them. Learn how Ixia network visibility can help give you an advantage against hackers, helping you optimize your network monitoring architecture while strengthening network security.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Ixia - Keysight

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

IBM

Five Reasons to Prioritize Privileged Access Management as-a-Service
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged Access Management (PAM) as-a-Service is becoming a popular method for deploying security solutions for a variety of reasons. Download this white paper for the top 5.
Posted: 03 Oct 2019 | Published: 03 Oct 2019

CyberArk Software, Inc

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

Adobe Document Cloud for Sales
sponsored by Adobe Systems Incorporated
WHITE PAPER: What does your organization know about your potential vendor's e-signature security features? In this white paper, discover 4 pertinent security questions you should be asking potential e-signature vendors, and learn how e-signature technology can help your organization achieve digital transformation.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Adobe Systems Incorporated

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

Rethinking Security for Digital Transformation
sponsored by ZeroNorth
WHITE PAPER: As software becomes more critical to every business, understanding risk that may exists gains increasing importance. Download this report to learn how organizations currently tackle security in the context of digital transformation—and where these initiatives may go in the future.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ZeroNorth

Meeting the Challenge of Cloud-Native Security Threats
sponsored by Amazon Web Services
WHITE PAPER: Learn how your network and security operations teams can gain real-time situational awareness of all users, devices, and traffic on the network, in the data center and across your AWS environment, so you can quickly and effectively respond to threats.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Amazon Web Services

Securing the Web Perimeter
sponsored by Cloudflare
WHITE PAPER: In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Cloudflare

2019 Digital Means Business Benchmarking Report
sponsored by Dimension Data
WHITE PAPER: Download this 28-page guide to learn about the seven pillars of digital transformation – and how to use them to simplify, quantify, and ultimately pinpoint the next actionable steps along your organization's digital transformation journey.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

TOPICS:  CIOs | IT Management
Dimension Data
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement