single sign

Results 76 - 100 of 151Sort Results By: Published Date | Title | Company Name
By: Shell     Published Date: May 30, 2019
The cost of a single turbine failure – whether it’s a steam, gas, water or combined cycle turbine - can amount to hundreds of thousands of dollars per hour. Avoiding turbine outages is business critical, but do you know what warning signs to look out for, and what steps to take to get to the root of the problem?
Tags : 
     Shell
By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Cloud is rapidly changing the ways we work — and the rate at which work will continue to change is only going to increase. To get the full business benefits of the cloud, your organization needs an agile infrastructure that allows people to securely connect to the data they need, and has the flexibility to adapt as technology evolves. Citrix Workspace will ensure you're able to do just that — improve business agility, increase productivity, and support any cloud or device as your future tech needs change. Download our e-book and find out how: To secure SaaS and web apps A single sign-on simplifies and secures log on To centralize routes to and from your data
Tags : 
     Citrix Systems
By: Citrix     Published Date: May 13, 2009
The traditional workforce model of permanent employees located in a single or small number of offices has undergone a significant transformation in recent years, accelerated by the effects of the current economic landscape. Drivers of this trend include initiatives to drive growth and expand into other markets, improve customer service, speed to market, improve decision-making processes, and increase both worker and overall organisational productivity.
Tags : citrix, virtualization, virtual workers, remote, remotely, outsource, teleworkers, business productivity, standard operating environment, soe
     Citrix
By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity and access management, saas applications, single sign-on, active directory, management solutions
     Okta
By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, it management, enterprise applications
     Bitium
By: Red Hat     Published Date: Mar 16, 2015
With Red Hat® Satellite, you can instantly see the status of your systems and if any are missing important patches or configuration changes.Not only does Red Hat Satellite improve security, it lets you easily measure and report on the patch level of systems in your company. Your security posture is improved through: • A single, centralized management tool. • Secure connection policies for remote administration. • Standardized machine configurations. • Digitally signed content.
Tags : centralized management took, security posture, configurations, remote administration, it management
     Red Hat
By: Okta     Published Date: Nov 09, 2015
You’re moving towards Office 365 and you want true single sign-on and secure authentication using AD for users. Read this eGuide to learn the top three reasons to consider Okta instead of Microsoft’s ADFS.
Tags : okta, office 365, okta vs microsoft, adfs, secure authentication, security, platforms, data management
     Okta
By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
     IBM
By: Janrain, Inc.     Published Date: Oct 29, 2012
Learn how to collect, store, and leverage the social profile data of your most profitable website users, plus best practices and case studies for social login, sharing, gamification, and single sign-on. Get the paper now!
Tags : janrain, user management, vibrant audience, online users, user engagement
     Janrain, Inc.
By: CDW     Published Date: Mar 31, 2015
Founded in 1929, the Rutgers Business School offers undergraduate and graduate degrees with programs in accounting, business administration, finance, information technology, pharmaceuticals and supply chain management. By leveraging cloud services, the burgeoning school can deliver rapid virtualization and easy single sign-on without cutting corners. Read this case study to learn more.
Tags : storage, cloud, infrastructure, data center, storage technologies, backup, security, it management, data management
     CDW
By: CDW     Published Date: Aug 04, 2016
Kevin Dowlin and his IT team deployed state-of-the-art infrastructure and classroom technologies for Rutgers Business School users, with help from IaaS and Microsoft Azure. By leveraging cloud services, the burgeoning school can deliver rapid virtualization and easy single sign-on without cutting corners.
Tags : technology, best practices, infrastructure, business management, microsoft
     CDW
By: NETIQ     Published Date: Jan 12, 2017
Users applications tend to be a mixture of cloud-based services, native apps and legacy applications that require a secure network connection like VPN. To eliminate the complexity, many companies have turned to single sign-on (SSO) solutions.
Tags : 
     NETIQ
By: Oracle     Published Date: Jan 21, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud — a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
     Oracle
By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Gigya     Published Date: Jun 20, 2014
As marketers the world over share conflicting stories of social triumph and trial in the pages of leading industry pubs, rumors run rampant across this largely uncharted marketing territory. We’re busting 5 major social marketing myths that have made their way into mainstream marketing lore, and revealing proven facts and strategies to help guide your social efforts and execution.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data, increase social engagement, consumer data management, permission based identity, single sign on, social consumer insights, big data marketing, data driven marketing , social marketing, social widget, social network plugin vendors, janrain, social annex
     Gigya
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
Start   Previous    1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com