SSO Research
-
Protecting and simplifying access to Electronic Health Records
Sponsored by: DigitalPersona, IncStudies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.
-
Better Leveraging Active Directory
Sponsored by: Radiant Logic, Inc.Find out how your business can have a better and more efficient identity management system in this white paper.
-
EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
Sponsored by: Oracle CorporationIT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
-
Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
Sponsored by: Radiant Logic, Inc.This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
-
Solution Summary - Secure Cloud
Sponsored by: Radiant Logic, Inc.This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
-
Provide Access Control With Innovative Solutions From IBM
Sponsored by: IBMUnauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
Realizing Business Value with Identity and Access Management
Sponsored by: IBMRead this white paper to learn how IBM identity and access management solutions help organizations realize business value through a centralized, automated identity and access management infrastructure.
-
An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
Sponsored by: Ping Identity CorporationCheck out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
-
Shouldn't Single Sign-on Be Child's Play?
Sponsored by: Microsoft & Quest SoftwareCheck out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
-
Principles of Agile Architecture
Sponsored by: Rally SoftwareThe benefits of Agile methods are becoming more obvious and compelling. While the most popular practices were developed and proven in small team environments, the interest and need for using Agile in the enterprise is growing rapidly...
-
The Realities of Single Sign-On
Sponsored by: PistolStar, Inc.Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
-
A Pathway to PCI Compliance
Sponsored by: ImprivataThis white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
-
Security Management of SOA
Sponsored by: IBM Software GroupTo meet the increased business demands for collaboration, integration, and internet-based services, many organizations are beginning to look at an infrastructure strategy based on Service Oriented Architecture.