Research Library > Technology > Security > Single Sign On

Single Sign On

Enterprise Single Sign-On (E-SSO), also called legacy single sign-on, after primary user authentication, intercepts login prompts presented by secondary applications, and automatically fills in fields such as a login ID or password. E-SSO systems allow for interoperability with applications that are unable to externalize user authentication, essentially through "screen scraping."
Results 1 - 25 of 44Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification
    
IBM
White Paper Published By: CA Technologies     Published Date: Jan 09, 2015
This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.
Tags : 
web application delivery, session hijacking, security, ca single sign-on, application security
    
CA Technologies
White Paper Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
access control, anti spam, anti spyware, anti virus, application security
    
Thawte
White Paper Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack
    
Imperva
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy
    
Cisco
White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : 
okta, authentication, single sign on, sign-on, sign on
    
Okta
White Paper Published By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : 
okta, authentication, single sign on, sign-on, sign on
    
Okta
White Paper Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile
    
CenturyLink
White Paper Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor
    
LogRhythm
White Paper Published By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : 
cloud security, botnet, phishing, advanced threats, policy compliance
    
ZScaler
White Paper Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches
    
VeriSign Authentication Services, now a part of Symantec Corp.
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management
    
DigitalPersona UK
White Paper Published By: Qualys     Published Date: Feb 22, 2010
This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.
Tags : 
qualys, network secure, it security, vulnerability, it budget
    
Qualys
White Paper Published By: Epicor     Published Date: Oct 07, 2009
Pressures to reduce costs continue to outweigh all other business drivers impacting Enterprise Resource Planning (ERP) in 2009. ERP has become more than a necessary infrastructure; it is also a strategic weapon in streamlining and accelerating business processes - while providing visibility to those processes throughout the enterprise.
Tags : 
erp, enterprise resource planning, enterprise applications, integrated suite, roi
    
Epicor
White Paper Published By: Epicor     Published Date: Sep 06, 2009
The technology world around us is changing rapidly. Keeping up has become tougher for managers and supervisors. Today's economy has focused limited information technology resources on immediate results, not research or long term strategy.
Tags : 
soa, epicor, business intelligence, it success, key strategies
    
Epicor
White Paper Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system
    
Ping Identity
White Paper Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled
    
Ping Identity
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.