ComputerWeekly.com Research Library

Powered by Bitpipe.com

SSO Research

  • Protecting and simplifying access to Electronic Health Records

    Sponsored by: DigitalPersona, Inc

    Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.

  • Better Leveraging Active Directory

    Sponsored by: Radiant Logic, Inc.

    Find out how your business can have a better and more efficient identity management system in this white paper.

  • EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise

    Sponsored by: Oracle Corporation

    IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.

  • Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories

    Sponsored by: Radiant Logic, Inc.

    This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.

  • Solution Summary  - Secure Cloud

    Sponsored by: Radiant Logic, Inc.

    This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.

  • Provide Access Control With Innovative Solutions From IBM

    Sponsored by: IBM

    Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.

  • Improving Identity and Access Management in an SAP Environment

    Sponsored by: Dell Software

    In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.

  • Realizing Business Value with Identity and Access Management

    Sponsored by: IBM

    Read this white paper to learn how IBM identity and access management solutions help organizations realize business value through a centralized, automated identity and access management infrastructure.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Sponsored by: Ping Identity Corporation

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • Shouldn't Single Sign-on Be Child's Play?

    Sponsored by: Microsoft & Quest Software

    Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.

  • Principles of Agile Architecture

    Sponsored by: Rally Software

    The benefits of Agile methods are becoming more obvious and compelling. While the most popular practices were developed and proven in small team environments, the interest and need for using Agile in the enterprise is growing rapidly...

  • The Realities of Single Sign-On

    Sponsored by: PistolStar, Inc.

    Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.

  • A Pathway to PCI Compliance

    Sponsored by: Imprivata

    This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

  • Security Management of SOA

    Sponsored by: IBM Software Group

    To meet the increased business demands for collaboration, integration, and internet-based services, many organizations are beginning to look at an infrastructure strategy based on Service Oriented Architecture.

Browse by Report Type: SSO White Papers | SSO Multimedia | SSO IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.