Single Sign On White Papers

Enterprise Single Sign-On (E-SSO), also called legacy single sign-on, after primary user authentication, intercepts login prompts presented by secondary applications, and automatically fills in fields such as a login ID or password. E-SSO systems allow for interoperability with applications that are unable to externalize user authentication, essentially through "screen scraping."
Results 1 - 25 of 42Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Cisco     Published Date: Jan 20, 2012

This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!

Tags : mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Okta     Published Date: Jan 06, 2012

In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
By: ZScaler     Published Date: Nov 16, 2011

The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.

Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
    
By: Wisegate     Published Date: Nov 02, 2011

IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.

Tags : governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices, monitoring, network security, remote access
    
By: Absolute Software     Published Date: Sep 06, 2011

Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: Google Apps     Published Date: May 16, 2011

This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security.

Tags : google apps, messaging, collaboration products, information security, security policies, vulnerability management, network security, dr/bc
    
By: Google     Published Date: May 05, 2011

This report measures the Total Economic Impact of moving your messaging and collaboration application from traditional, on-premise products to Google Apps.

Tags : google apps, collaboration, roi, forrester, cloud-based messaging, total economic impact, on-premise products, npv
    
By: Epicor     Published Date: Oct 07, 2009

Pressures to reduce costs continue to outweigh all other business drivers impacting Enterprise Resource Planning (ERP) in 2009. ERP has become more than a necessary infrastructure; it is also a strategic weapon in streamlining and accelerating business processes - while providing visibility to those processes throughout the enterprise.

Tags : erp, enterprise resource planning, enterprise applications, integrated suite, roi, tco, inventory reduction, sap
    
By: Epicor     Published Date: Sep 06, 2009

The technology world around us is changing rapidly. Keeping up has become tougher for managers and supervisors. Today's economy has focused limited information technology resources on immediate results, not research or long term strategy.

Tags : soa, epicor, business intelligence, it success, key strategies, erp, enterprise resource planning, availability
    
By: Ping Identity     Published Date: May 05, 2009

This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!

Tags : pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing
    
By: Ping Identity     Published Date: May 05, 2009

With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
By: Lumension     Published Date: Jan 11, 2012

The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Previous   1 2    Next    

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.