IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed   
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
1 - 25 of 5738 Matches Previous Page  |  Next Page
10 AI and machine learning use cases in ITSM
sponsored by ComputerWeekly.com
EGUIDE: AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM
Posted: 12 Jul 2020 | Published: 13 Jul 2020

ComputerWeekly.com

10 Essential Capabilities of a Modern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

10 Essential Kpis For The It Strategic Planning Process
sponsored by Apptio
WHITE PAPER: IT strategic plans need key performance indicators (KPIs) that show financial fundamentals, delivery, innovation, and agility to support the business strategy. These aren’t just operational measures – they are proof that IT is delivering business value. Open up this white paper to find ten essential KPIs for the strategic IT planning process.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  IT Management
Apptio

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

10x Your IT Operational Efficiency: How to Do More with Less in the Digital Workplace
sponsored by Bettercloud
EBOOK: With big change comes new priorities and imperatives, like reduced operational budgets. And when times get lean, IT must also. Check out this e-book to learn four essentials when it comes to amping up your IT operational efficiency.
Posted: 12 Aug 2021 | Published: 12 Aug 2021

TOPICS:  IT Management
Bettercloud

11 Recommended Security Practices to Manage the Container Lifecycle
sponsored by VMware Tanzu
WHITE PAPER: Development, security, and operations leaders all share a common concern: application security across the software development lifecycle. The problem is, no team wants to fully claim this challenge as their own. Download this guide to learn about 11 security practices that everyone can get behind.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

VMware Tanzu

11 Required Monitoring Platform Capabilities for Enterprise DevOps Teams
sponsored by Datadog
WHITE PAPER: As DevOps teams work with an unprecedented volume of data, effective end-to-end monitoring is a key capability for any DevOps initiative. Here, explore the 11 required monitoring platform capabilities for enterprise DevOps teams. Download it here.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Datadog

11 ways infrastructure and service visibility delivers benefits across IT
sponsored by ServiceNow
WHITE PAPER: ServiceNow IT Operations Management Visibility discovers IT infrastructure and automatically maps it to digital services. Learn how connecting this operational data to business processes improves service availability and performance, reduces operational risk, lowers service delivery costs, and more.
Posted: 26 Jul 2021 | Published: 26 Jul 2021

TOPICS:  IT Management
ServiceNow

13 email threat types to know about right now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

18 Windows 10 Facts IT Must Know
sponsored by VMware
EGUIDE: Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

10 Best Practices For Reducing Spend In AWS
sponsored by CloudHealth by VMware
WHITE PAPER: Access these 10 proven best practices for cost reduction and optimization in Amazon Web Services (AWS).
Posted: 27 Nov 2018 | Published: 27 Nov 2018

TOPICS:  IT Management
CloudHealth by VMware

10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Learn from your peers. Compare these 10 common mistakes to your incident response practices to improve effectiveness.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Reasons LinuxONE is the Best Choice for Linux Workloads
sponsored by IBM
WHITE PAPER: Here's a freebie: Linux applications on x86 servers is 65% more expensive than on LinuxONE servers. Read on for 10 more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

TOPICS:  IT Management
IBM

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

100+ Million Cameras – AI and Video are Changing the Edge
sponsored by Western Digital
WHITE PAPER: Learn how the drastic increase in network cameras and use of AI is causing organizations to rethink their edge architectures.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TOPICS:  IT Management
Western Digital

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

15 Popular IT and Business Certifications
sponsored by Global Knowledge
WHITE PAPER: This report reviews the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge
1 - 25 of 5738 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences