single sign

Results 76 - 100 of 151Sort Results By: Published Date | Title | Company Name

ESSO: The Next Big Win for IT

Published By: Imprivata     Published Date: Aug 21, 2009
Enterprise Single Sign-On (ESSO) has emerged with a similar potential to transform enterprise security. This white paper takes a closer look at ESSO, the problems it solves, and how it will fundamentally change the way corporations address their security needs.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata

IDC Health Insights – A Case Study: The Johns Hopkins Hospital SSO

Published By: Imprivata     Published Date: Dec 06, 2013
This case study focuses on the implementation of single sign-on at The John Hopkins Hospital which streamlined provider access to applications.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Imprivata

An Introduction to Imprivata OneSign

Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Imprivata

Single Sign-On and Strong Authentication: A More Secure Front Door

Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Imprivata

Single Sign-On Vendor Selection Evaluator’s Guide

Published By: Imprivata     Published Date: Dec 06, 2013
Ensure that you have the right single sign-on vendor with this easy to use vendor selection evaluator’s guide.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Imprivata

Mahaska Health Partnership Saves Clinicians 45 Minutes a Day

Published By: Imprivata     Published Date: Dec 06, 2013
See how Mahaska Health Partnership implemented single sign-on to achieve fast, secure access to their EMR applications.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Imprivata

Imprivata 2014 Desktop Virtualization Trends in Healthcare Report

Published By: Imprivata     Published Date: Sep 23, 2014
The Imprivata 2014 Desktop Virtualization Trends in Healthcare report is the company’s fourth-annual study to identify desktop virtualization adoption trends in healthcare.
Tags : 
imprivata, desktop virtualization, healthcare, trends, us healthcare industry, hipaa, phi, sso
    
Imprivata

Infinidat® Open Stack Solutions

Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA

Access all your cloud-based apps with just one password.

Published By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus

No More Passwords on Sticky Notes. How to Secure and Manage Access to your Cloud Applications.

Published By: IronStratus     Published Date: Apr 10, 2012
Passwords are the keys to your corporate apps in the cloud and they're managed ad-hoc and insecurely in spreadsheets, sticky notes & browser cache. Signup for a free IronStratus account and start securely managing access to your cloud apps in minutes
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus

The Definitive Guide to User Management

Published By: Janrain, Inc.     Published Date: Oct 29, 2012
Learn how to collect, store, and leverage the social profile data of your most profitable website users, plus best practices and case studies for social login, sharing, gamification, and single sign-on. Get the paper now!
Tags : 
janrain, user management, vibrant audience, online users, user engagement
    
Janrain, Inc.

Single Sign-On for Kerberized Linux and UNIX Applications

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos, open ssh, security, internet security
    
Likewise Software

The Business Case for Healthcare Access Solution

Published By: Logicalis     Published Date: Aug 29, 2014
Download this whitepaper to learn 4 way your healthcare organization can benefit from a healthcare access solution.
Tags : 
logicalis, healthcare access solution, healthcare it, hit, virtual desktop infrastructure, single sign on, byod, managed services
    
Logicalis

Protecting sensitive corporate data from the full spectrum of mobile risks

Published By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout

Webinar: Protecting Sensitive Corporate Data from the Full Spectrum of Mobile Risks

Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout

Accelerate your General Data Protection Regulation (GDPR) Compliance Journey

Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365

Single Sign-On: With Passwords, Less is more

Published By: NETIQ     Published Date: Jan 12, 2017
Users applications tend to be a mixture of cloud-based services, native apps and legacy applications that require a secure network connection like VPN. To eliminate the complexity, many companies have turned to single sign-on (SSO) solutions.
Tags : 
    
NETIQ

Multidiscipline Practices: The Business Model of the Future — Today

Published By: NFP Advisor Services     Published Date: Feb 27, 2015
Clients, especially those with a high net worth, are increasingly demanding guidance for all of their financial needs from a single source. A multidiscipline practice enables you to provide them with complete wealth management solutions, resulting in higher rates of client satisfaction, retention and referral. Learn how to exploit social media opportunities, build a strategy that's right for you, design online profiles that match your goals and much more.
Tags : 
business models, growth performance, advisor services, multidiscipline practices, business owners, complex mdp, iinvestments, insurance
    
NFP Advisor Services

Single Sign-On / Focal Point Evaluator's Guide

Published By: Okiok     Published Date: Aug 21, 2009
To successfully deploy Single Sign-On today, most organizations have a set of key requirements that must be met. Here are some tips on how focal Point can help organizations seeking Single Sign-On meet those requirements.
Tags : 
single sign on, sso, sso deployment, single sign on deployment, authentication, identity management, okiok, security management
    
Okiok

Automating User Management and Single Sign-on for Salesforce.com

Published By: Okta     Published Date: Dec 15, 2010
This paper focuses on the challenges of integrating Salesforce.com logins for single sign-on (SSO) and automating provisioning/de-provisioning from on-premise directories like Active Directory.
Tags : 
okta, user management automation, single sign-on, salesforce.com, active directory, access management, application administrator, application integration
    
Okta

An Overview of Okta's Multifactor Authentication Capability

Published By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
Okta

Cloud Management Begins with Identity

Published By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
Okta

Top 8 Identity & Access Management Challenges

Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions, access control, identity management
    
Okta

DocuSign Case Study: Centralize. Automate. Secure

Published By: Okta     Published Date: Jul 01, 2015
Watch this short video and learn how DocuSign, with Okta single sign-on, increased cost savings, end-user productivity and overall security.
Tags : 
    
Okta

Gatwick Case Study

Published By: Okta     Published Date: Jul 01, 2015
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff. Watch this short video to see Gatwick's story.
Tags : 
    
Okta
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.