IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on Reports
 
Is Your Enterprise Network Multi-Cloud Ready?
sponsored by VMware
WHITE PAPER: Many businesses that have adopted a multi-cloud strategy have seen their IT environment turn into a patchwork. This means there are more environments to manage than ever before, and more things to connect and secure. In this white paper, learn why consistent networking and security are the key to making a multi-cloud strategy successful.
Posted: 19 May 2020 | Published: 19 May 2020

VMware

Why containerization needs context
sponsored by New Relic
WHITE PAPER: Complex application architectures are leveraged to deliver better user experiences, yet user experiences ultimately decrease due to downtime, bugs, and latency. This is the paradox of modern software environments. In this guide, learn how to undo the paradox and benefit from modern architectures without jeopardizing the user experience.
Posted: 19 May 2020 | Published: 19 May 2020

TOPICS:  IT Management
New Relic

Vulnerability Remediation in Three Steps
sponsored by Vulcan
RESOURCE: As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.
Posted: 20 May 2020 | Published: 28 Nov 2019

Vulcan

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

Close the Gaps in Your Defenses with Automated Detection, Investigation and Response
sponsored by Splunk
WHITE PAPER: This e-book explores the anatomy of a truly integrated defense, including automated detection, investigation and response. Read on to start thinking about where the gaps might be in your own environment, so you can build a strategy to lock them down for good.
Posted: 21 May 2020 | Published: 21 May 2020

Splunk

Secure Everywhere: The Power of Integrated Internet, Endpoint, And Email Security
sponsored by Cisco Umbrella
EBOOK: In order to overcome the hurdles of today’s ever-increasing cybersecurity skills gap, IT and security team leaders are constantly on the lookout for ways to use their existing resource more efficiently. Read this e-book to learn more about an integrated approach to security that maximizes efficiency and intelligence across disparate systems.
Posted: 18 May 2020 | Published: 18 May 2020

Cisco Umbrella

Top 10 Considerations When Choosing a Privileged Access Management Solution
sponsored by CyberArk Software, Inc
ANALYST REPORT: Several powerful PAM solutions are now on the market. Which one is right for your organization? Find out from IT Central Station members who offered insights based on their experiences with the CyberArk Privileged Access Security (PAS) solution.
Posted: 18 May 2020 | Published: 18 May 2020

CyberArk Software, Inc

IAM Leaders’ Guide to Privileged Access Management
sponsored by Centrify Corporation
RESOURCE: While traditional identity and access management (IAM) tools offer control of standard user access, they fail to manage shared use of privileged accounts or administrator privilege elevation. This Gartner report provides a comprehensive analysis of privileged access management, designed to be the next step in IAM.
Posted: 20 May 2020 | Published: 22 Jul 2019

Centrify Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info