ComputerWeekly.com Research Library

Powered by Bitpipe.com

SSO Research

  • 6 user authentication types to secure networks

    Sponsored by: TechTarget ComputerWeekly.com

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: TechTarget ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: TechTarget ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Single Sign-On Service Requires a Cloud-Era Update

    Sponsored by: TechTarget Security

    The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.

  • Making Sign-on Simple and Secure

    Sponsored by: TechTarget Security

    Single sign-on (SSO) has a complicated history but this technical guide can bring you up to date quickly on how the main protocols for SSO - OpenID and Security Assertion Markup Language (SAML) - compare and how they can be connected to the pieces you already have.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    Sponsored by: IBM

    Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.

  • How to Properly Move into the Cloud

    Sponsored by: Forum Systems

    This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.

  • Cover Your SaaS!

    Sponsored by: BitGlass

    This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.

  • Evaluating File Sync and Share Security

    Sponsored by: Dropbox for Business

    This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.

  • Can a Federated Identity Service Strengthen SSO?

    Sponsored by: Radiant Logic, Inc.

    With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure

  • Managing identities and access in the cloud

    Sponsored by: IBM

    This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.

  • Eagle Bank Keeps Deposits and Customer Data Safe

    Sponsored by: Imprivata

    This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.

  • The Key to Seamless SSO: Building a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.

  • Pick Your Identity Bridge

    Sponsored by: Ping Identity Corporation

    This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.

  • Strategies for Enhancing the Clinician’s Workstation Productivity

    Sponsored by: Siemens

    Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.

  • Bloomberg Personal Vault

    Sponsored by: Bloomberg

    Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.

  • Okta Active Directory Integration - An Architecture Overview

    Sponsored by: Okta

    This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.

  • Identity and Access Management Buyer's Guide

    Sponsored by: IBM

    This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.

  • Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall

    Sponsored by: PortalGuard

    Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.

  • Enterprise Single Sign On

    Sponsored by: tools4ever

    With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.

  • Beverly Hills Wealth Management Case Study

    Sponsored by: Intel

    Read this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.

  • Top 10 Tips to Make Access to SaaS, Enterprise Class Secure

    Sponsored by: Intel

    In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.

  • Adaptive Strong Auth & Federated SSO - The New Power Couple

    Sponsored by: Intel

    Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

  • Managing data and application security risks cost effectively

    Sponsored by: IBM

    This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.

Browse by Report Type: SSO White Papers | SSO Multimedia | SSO IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.