IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on White Papers (View All Report Types)
 
Five Major Bot Threats to E-commerce and How to Stop Them
sponsored by PerimeterX
WHITE PAPER: It’s always important that online retail companies are prepared for any cybersecurity threats to keep both customer and company data secure. Luckily, this white paper highlights 5 major types of attacks companies need to be vigilant of, as well as defensive capabilities for addressing these threats. Read on to make sure your organization is ready.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Delivering a Digital Transformation to Business Partners
sponsored by ServiceNow
WHITE PAPER: Download this eBook to gauge the current state of IT support and operations teams, including modern day priorities, risks, and costs –and how to deliver on digital transformation goals despite potential setbacks.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

ServiceNow

Simplify Your Application Security
sponsored by WhiteHat Security
WHITE PAPER: Application development is slowly but surely becoming a more secure process thanks to DevSecOps. But with added security comes slower productivity and added pressures to already limited resources. WhiteHat Sentinel introduces application security fit for the DevOps cycle. Read the white paper here to find out how.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

WhiteHat Security

Security Starts at the Edge
sponsored by Akamai Technologies
WHITE PAPER: Whether you’re a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective security solution for your business. In this guide, for learn how you can find the right solution for your business to scale resilience, build trust, and drive revenue.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

4 Steps to Building a PII Catalog for Privacy
sponsored by BigID
WHITE PAPER: Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

CISO’s Playbook to Cloud Security
sponsored by Lacework
WHITE PAPER: As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Lacework

The Cost of an Application Security Testing Program
sponsored by WhiteHat Security
WHITE PAPER: How can your organization decide if an application security testing program is worth the cost? This WhiteHat Security white paper breaks down all the costs involved in application security so your organization can stay secure – and on budget. Read the white paper now.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

WhiteHat Security

Quick Study: A Well-Defined Digital Transformation
sponsored by Hyland
WHITE PAPER: Gain access to a cheat-sheet to reference as you craft your organization’s digital transformation strategy for 2020 – and learn about the key technology choices you’ll need to know along the way.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Hyland

How to Build a Winning Cybersecurity Team
sponsored by Global Knowledge
WHITE PAPER: Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info