ComputerWeekly.com Research Library

Powered by Bitpipe.com

SSO Research

  • Okta Identity Management for Portals Built on Salesforce.com

    Sponsored by: Okta

    Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.

  • Schneider Electric Secures 50,000 Devices with Lookout

    Sponsored by: Lookout

    As organizations shift towards remote access capabilities, securing mobile devices should be a top priority. In this case study, discover how Schneider Electric, a leader in energy management and automation, was able to build a complete mobile security strategy.

  • 5 Reasons Relying on Passwords is a Recipe For Disaster

    Sponsored by: OneLogin

    In today's environment—with cybercrime rising and hackers beginning to use machine learning—passwords just don't provide enough protection for businesses. Download this resource for 5 reasons why.

  • Why IT Shouldn't Be the Middle Guy in Password Resets

    Sponsored by: OneLogin

    When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Prevent Laptop Security Breaches —No Active Directory Required

    Sponsored by: OneLogin

    Users accessing corporate data, apps, devices, on laptops or off-premise, is at an all-time high and businesses must increase their security. Explore ways your organization can shrink its security gaps and risks with Single-Sign On (SSO).

  • CW buyer’s guide: managing identity & access

    Sponsored by: ComputerWeekly.com

    This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators.

  • Single Sign-On Service Requires a Cloud-Era Update

    Sponsored by: SearchSecurity.com

    The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.

  • Making Sign-on Simple and Secure

    Sponsored by: SearchSecurity.com

    Single sign-on (SSO) has a complicated history but this technical guide can bring you up to date quickly on how the main protocols for SSO - OpenID and Security Assertion Markup Language (SAML) - compare and how they can be connected to the pieces you already have.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    Sponsored by: IBM

    Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.

  • How to Properly Move into the Cloud

    Sponsored by: Forum Systems

    This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.

  • Cover Your SaaS!

    Sponsored by: BitGlass

    This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.

  • Evaluating File Sync and Share Security

    Sponsored by: Dropbox for Business

    This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.

  • Can a Federated Identity Service Strengthen SSO?

    Sponsored by: Radiant Logic, Inc.

    With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure

  • Managing identities and access in the cloud

    Sponsored by: IBM

    This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.

  • Eagle Bank Keeps Deposits and Customer Data Safe

    Sponsored by: Imprivata

    This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.

  • The Key to Seamless SSO: Building a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.

  • Pick Your Identity Bridge

    Sponsored by: Ping Identity Corporation

    This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.

  • Strategies for Enhancing the Clinician’s Workstation Productivity

    Sponsored by: Siemens

    Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.

  • Bloomberg Personal Vault

    Sponsored by: Bloomberg

    Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.

  • Okta Active Directory Integration - An Architecture Overview

    Sponsored by: Okta

    This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.

  • Identity and Access Management Buyer's Guide

    Sponsored by: IBM

    This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.

  • Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall

    Sponsored by: PortalGuard

    Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.

  • Enterprise Single Sign On

    Sponsored by: tools4ever

    With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.

Browse by Report Type: SSO White Papers | SSO Multimedia | SSO IT Downloads

See more topics related to: SSO

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.