Security Access Markup Language Reports

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008

Oracle Corporation

The future of email and applications is social
sponsored by IBM
WHITE PAPER: While it's difficult to imagine a workplace without email, today many businesses are coping with information overload. Email is a key factor of business collaboration tools, so businesses need to find a way to modify information management. View this white paper to learn more about what the future of email application entails.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

IBM

Modernize Your Approach to Authentication
sponsored by TechTarget Security
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

TechTarget Security

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
Posted: 14 Mar 2022 | Published: 15 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
Posted: 10 Nov 2023 | Published: 14 Nov 2023

TechTarget ComputerWeekly.com

Getting the best out of robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.
Posted: 12 Jan 2024 | Published: 16 Jan 2024

TechTarget ComputerWeekly.com