Single Sign On Reports

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Single Sign-On Service Requires a Cloud-Era Update
sponsored by TechTarget Security
EBOOK: The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

TechTarget Security

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Better Leveraging Active Directory
sponsored by Radiant Logic, Inc.
WHITE PAPER: Find out how your business can have a better and more efficient identity management system in this white paper.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Radiant Logic, Inc.

Managing data and application security risks cost effectively
sponsored by IBM
WHITE PAPER: This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.
Posted: 01 Jul 2011 | Published: 01 Oct 2009

IBM

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER: This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

Security Management of SOA
sponsored by IBM Software Group
WHITE PAPER: To meet the increased business demands for collaboration, integration, and internet-based services, many organizations are beginning to look at an infrastructure strategy based on Service Oriented Architecture.
Posted: 17 Oct 2006 | Published: 01 Aug 2006

IBM Software Group

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

Solution Summary  - Secure Cloud
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.