IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed   
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
226 - 250 of 6463 Matches Previous Page  |  Next Page
7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

7 Scenarios That Call for Managed, Cloud-Centric IT Services
sponsored by Concerto Cloud Services
PRODUCT LITERATURE: If you don't have the time, staff, or budget to address every scenario on your own, managed cloud services are a compelling option. This white paper covers seven of the most common IT issues and how managed cloud services help solve them.
Posted: 31 Jan 2018 | Published: 31 Jan 2018

Concerto Cloud Services

7 Steps to Overcome SSL Security Issues and Vulnerabilities
sponsored by Fortinet, Inc.
EGUIDE: As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps.
Posted: 02 Jun 2017 | Published: 25 May 2017

Fortinet, Inc.

7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Rapid7

7 Tough Questions to Ask Before Switching Certification Authorities
sponsored by Entrust, Inc.
WHITE PAPER: A certification authority is responsible for the issuance and management platform of digital certificates, which secure internal servers, web applications, emails and more. This resource offers 7 tough questions to ask before switching certification authorities.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

7 Use Cases for Meeting Your Comprehensive Test Data Needs
sponsored by CA Technologies
RESOURCE: Address quality and compliance challenges that arise from provisioning large copies of production data with a comprehensive test data management solution. Read on to learn 7 methods for the reduction of IT ops complexity in application delivery and in DevOps development.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

CA Technologies

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

8 tips to ensure your server technology supports your business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Servers are the workhorse of the modern business, and as IT demands increase, so your server technology needs to be able to grow and scale cost-effectively to meet future requirements.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

8 Ways Legacy ERP Harms Businesses
sponsored by Oracle NetSuite
WHITE PAPER: Customizations acting like "silicon concrete" can harden legacy ERP against change and slow your business to a crawl. Cloud ERP can free businesses from the brittle, inflexible and change-resistant ERP of the past. Access this white paper to learn 8 ways legacy ERP harms businesses.
Posted: 14 Jul 2016 | Published: 31 Dec 2015

Oracle NetSuite

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

7 Reasons Why Appliances Improve Your Backup Infrastructure
sponsored by Veritas
WHITE PAPER: Discover how using an appliance for backup and recovery simplifies IT processes and reduces costs.
Posted: 29 Mar 2017 | Published: 29 Mar 2017

TOPICS:  IT Management
Veritas

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

7 Vital Tips for Video Meetings Sales Success
sponsored by IBM
WHITE PAPER: This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Posted: 24 Feb 2011 | Published: 29 Jan 2013

IBM

7 Ways It Pays to Move Backup to the Cloud
sponsored by Druva Software
WHITE PAPER: Gain efficiencies and achieve unprecedented cost savings with cloud-based backup. Learn how with these 7 points.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

7 Ways SteelFusion and Branch IT Resemble Your Smartphone
sponsored by Riverbed Technology, Inc.
WEBCAST: What do smartphones and HCI have in common? Find out how to rethink IT and keep it as simple and seamless as your phone.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

7 Ways the Best Hyperconvergence Is Like Your Smartphone
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Is branch IT a problem for your organization? Improve management by examining best practices in another area: devices.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article explores 7 steps to guard your network against rogue users. Read on to discover the unobtrusive measures you can take to catch and stop inside threats.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

8 Advantages of Disaster Recovery in the Cloud
sponsored by Druva Software
WHITE PAPER: Remove the costly management and burden of secondary data centers. Utilize the public cloud to realize these advantages.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

8 Common Mistakes of Windows 7 Migration
sponsored by DellEMC and Intel®
WEBCAST: Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program
Posted: 15 Apr 2011 | Premiered: Apr 27, 2011, 12:00 EDT (16:00 GMT)

DellEMC and Intel®

8 Questions You Should Ask About Linux Systems Management
sponsored by Red Hat and JBoss
WHITE PAPER: IT organizations are always looking for ways to save money and time without compromising on issues like security or compliance. Exploring the value of your systems management solution is a lot easier when you know the right questions to ask. We have a few suggestions for how to get started.
Posted: 29 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

8 Quick Tips to Choosing Virtual Management Tools
sponsored by Starview Inc.
EGUIDE: Review this e-guide, brought to you by SearchServerVirtualization.com, for eight expert tips for choosing virtualized management tools and monitoring software and learn more about automating server management and IT processes.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Starview Inc.

8 Strategies for Business Process Automation Success
sponsored by K2
WHITE PAPER: Choosing the right business process automation solution isn't easy. Evaluate platform quality across these 8 key areas.
Posted: 19 May 2016 | Published: 19 May 2016

TOPICS:  IT Management
K2

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.
226 - 250 of 6463 Matches Previous Page    8 9 10 11 12 13    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement