IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed   
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Reports
51 - 75 of 5851 Matches Previous Page  |  Next Page
2017 Salary Survey - Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: We recently asked our members to share their experiences around IT salary and career goals. With results from 330+ IT pros in Australia/New Zealand we were able to identify some key employment trends and find out more about training, qualifications and diversity in IT departments. Read the results here and see how you compare with your peers.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ComputerWeekly.com

2017 Salary Survey ANZ Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Download the 2017 Salary Survey ANZ infographic to discover the latest information about demographics, training, earnings and women in IT.
Posted: 12 Sep 2017 | Published: 13 Sep 2017

ComputerWeekly.com

2017 Salary Survey ASEAN Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Download the 2017 Salary Survey ASEAN infographic to discover the latest information about demographics, training, earnings and women in IT.
Posted: 12 Sep 2017 | Published: 13 Sep 2017

ComputerWeekly.com

2017 UKI Salary Survey Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Download the 2017 UKI salary survey infographic to discover the latest information about demographics, training, earnings and women in IT.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

ComputerWeekly.com

2018 UKI Media Consumption Infographic
sponsored by ComputerWeekly.com
EGUIDE: This infographic is based on the results of our annual media consumption survey. The stats within were collected from over 150 respondents from across the United Kingdom and Ireland in 2018.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

ComputerWeekly.com

2020 Cost of Insider Threats Global report
sponsored by Proofpoint
WHITE PAPER: Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Proofpoint

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

2020 EMEA Media Consumption Infographic - Why?
sponsored by ComputerWeekly.com
EBOOK: In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out why sales reps with data-driven intent get the best response and what subject line gets the open?
Posted: 21 Oct 2020 | Published: 21 Oct 2020

ComputerWeekly.com

2020 IT Priorities UKI Infographic
sponsored by ComputerWeekly.com
EBOOK: Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for decision makers in the UK and Ireland in 2020.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

ComputerWeekly.com

2020 Media Consumption Series - What
sponsored by ComputerWeekly.com
EGUIDE: In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out what prospects' advice is for your content creation team and what data users are willing to share in exchange for quality content?
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

2020 Media Consumption Series - Where
sponsored by ComputerWeekly.com
EBOOK: In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out where is pre-purchase research conducted and what types of content are most preferred for consumption for purchase research?
Posted: 21 Oct 2020 | Published: 21 Oct 2020

ComputerWeekly.com

2020 Media Consumption Series - Why
sponsored by ComputerWeekly.com
EGUIDE: In this infographic based on the results of our 2020 Media Consumption Survey, find out why sales reps with data-driven intent get the best response and what subject line gets the open?
Posted: 26 Oct 2020 | Published: 19 Oct 2020

ComputerWeekly.com

2020 Media Consumption Series - Why
sponsored by ComputerWeekly.com
EGUIDE: In this infographic based on the results of our 2020 Media Consumption Survey, find out why sales reps with data-driven intent get the best response and what subject line gets the open?
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

2020 Naughty Vendor List Revealed
sponsored by ClearEdge
WEBCAST: Each December, ClearEdge Partners, a consulting firm that advises IT buyers how to successfully negotiate with key IT vendors, looks back over the last twelve months at the behavior of the industry's top suppliers and shines a light on who's not been very nice to their customers. Check out this webinar to learn which vendors made the list.
Posted: 10 Sep 2021 | Premiered: Dec 15, 2020

ClearEdge

2020 Sans Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT: In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020

Infoblox

2020 State of SOAR Report
sponsored by Palo Alto Networks
WHITE PAPER: Get your copy of the State of SOAR Report 2020 and see how your security team can leverage SOAR to improve, automate and securely enable your SOC.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Networks

2020 Unit 42 IoT Threat Report
sponsored by Palo Alto Networks
RESEARCH CONTENT: To assess the current state of the IoT threat landscape, Palo Alto Network's Unit 42 threat intelligence and IoT security experts analyzed security incidents throughout 2018 and 2019 across 1.2 million IoT devices in the U.S. Read the report for steps you can take to develop an effective IoT strategy that prepares your business for the long term.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

Palo Alto Networks

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

2021 IT Priorities: APAC Key Technology Areas Infographic
sponsored by ComputerWeekly.com
EGUIDE: This year, we asked nearly 300 IT professionals in APAC which technology areas they identified as being imperative for 2021. In this infographic find out how remote working is influencing investments, learn about shifts in application development trends and which infrastructure tools will be deployed most in 2021.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

ComputerWeekly.com

2021 IT Priorities: APAC report
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 09 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

2021 Perch MSP Threat Report
sponsored by ConnectWise
WEBCAST: In this webinar, industry experts focus in on the 2021 Perch MSP Threat Report, evaluating MSP-related security events and trends. Tune in now to learn more details around why MSPs are vulnerable targets, predictions for 2021 and more.
Posted: 03 May 2021 | Premiered: May 3, 2021

TOPICS:  Security
ConnectWise

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

2021 Technology Spending Intentions Survey
sponsored by Tanium
ANALYST REPORT: In order to assess technology spending priorities over the next 12-18 months, ESG recently surveyed 664 IT and business professionals representing midmarket and enterprise-class organizations in North America and Western Europe. Download the report to uncover the results.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

2021 UKI Salary Survey - Diversity Infographic
sponsored by ComputerWeekly.com
EGUIDE: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.
Posted: 24 Feb 2021 | Published: 24 Feb 2021

ComputerWeekly.com

2017 State Of Cloud Adoption And Security
sponsored by McAfee, Inc.
WHITE PAPER: Hybrid cloud adoption grew 3x and soon 80% of IT budgets will go to cloud solutions. See additional key insights.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.
51 - 75 of 5851 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences