IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on Reports
 
Best Practices for Deploying Enterprise Single Sign-On (SSO)
sponsored by BIO-key International
EGUIDE: Deploying single sign-on (SSO) in the enterprise can be daunting for IT professionals. Not only must they consider how a solution will be implemented into their existing architecture, they also have to address compliance and vendor fit. If this sounds like you, access our expert guide containing key best practices for enterprise SSO deployment.
Posted: 30 Oct 2020 | Published: 27 Oct 2020

BIO-key International

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are becoming increasingly costly – in fact, the average global cost to remediate an attack is over $700,000. One of the best ways to protect against ransomware attacks is with properly configured endpoint protection. Read on to discover best practices for configuring your endpoint protection against ransomware.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Sophos

Minimizing Risk From Cyber-Threats: Focus On Reducing Time To Containment
sponsored by Claranet
WHITE PAPER: In order to minimize the growing risks from cyberthreats, CISOs and other security leaders are turning towards next-generation endpoint detection and response (EDR) tools – but how does the current iteration of EDR capabilities differ from the previous generation? Read on to find out.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

Your Guide to DNS Security
sponsored by TechTarget
RESOURCE: Which of the following web and application security technologies is your company planning to purchase within the next 12 months? Secure application development and testing, web security, or application and container security? Let us know in our Web & Application Security Survey. As a thank you, you'll receive our expert guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TechTarget

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Spotting a Denial-of-Service (DoS) Attack
sponsored by Farsight Security
RESOURCE: DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering organizations virtually invisible online and cutting off interaction with customers. They can last for hours, days or even longer and cost organizations significant time, money and resources. View this infographic to see how to mitigate these attacks.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Farsight Security

Dissecting a Chinese APT Targeting Southeast Asian Government Institutions
sponsored by Bitdefender
VIDEO: Advanced persistent threats (APTs) typically follow a similar framework and timeline – with slight variations depending on the target and scope of the attack. This webinar dissects the infamous Chinese APTs targeting southeast Asian governments – focusing on the timeline, tactics and early warning signs of an APT.
Posted: 25 Nov 2020 | Premiered: 25 Nov 2020

Bitdefender

Mobile Security App-titude
sponsored by WhiteHat Security
WEBCAST: View Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy to learn about PII – what data is being collected, how sensitive information can be compromised, how you can protect user data, and more.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

WhiteHat Security

PSA Certified Program Overview
sponsored by Archetype
WHITE PAPER: In this interactive white paper, learn how PSA Certified reduces the time, cost and risk involved in building a trustworthy device and it aligns with major industry standards and government regulations.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

TOPICS:  Security
Archetype

WalkMe Receives a 360-Degree View of Suppliers using Panorays
sponsored by Panorays
CASE STUDY: WalkMe, a SaaS company that helps users navigate the features of other web-based services, was looking for a way to check the security posture of its many third parties.In this case study, learn how Panorays provided them with continuous monitoring with live alerts, reduced time spent verifying answers and improved quality of security evaluations.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

TOPICS:  Security
Panorays
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info