single sign

Results 101 - 125 of 153Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to todays security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365
Published By: Rackspace     Published Date: Mar 08, 2016
This white paper focuses specifically on Microsofts approach to managing user demands and security concerns, featuring Office 365 and Azure.
Tags : 
rackspace, office 365, microsoft azure, on premise environments, security, hybrid, enterprise applications
    
Rackspace
Published By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : 
email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt
    
Sunbelt Software
Published By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus
Published By: IronStratus     Published Date: Apr 10, 2012
Passwords are the keys to your corporate apps in the cloud and they're managed ad-hoc and insecurely in spreadsheets, sticky notes & browser cache. Signup for a free IronStratus account and start securely managing access to your cloud apps in minutes
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus
Published By: Epicor     Published Date: Feb 10, 2016
If youre like most corrugated packaging manufacturers, your company operates multiple plants where each plant uses a different enterprise resource planning (ERP) system. This arrangement of multiple ERP systems could be costing you valuable time and money and promoting inefficiencies such as manual data entry. Upgrading to a single ERP system designed for multi-plant operations can help you solve these issues and more. View this whitepaper for eight ways to improve efficiencies with a single ERP system designed for multi- plant operations.
Tags : 
erp system, corrugated packaging manufacturers, business operations, manual data entry, enterprise applications
    
Epicor
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean managements approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Lets explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development
    
IBM
Published By: IBM     Published Date: Jul 31, 2018
Simplify and secure identity and access management with IBM Cloud Identity for single sign-on, seamless access and improved efficiency.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 10, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the users identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Ping Identity     Published Date: Jan 29, 2013
Although the term "SSO" seems self-descriptive, the technical approaches to accomplishing it can get muddy for all but the identity security savvy IT manager. Make sure you are not putting your organization at risk.
Tags : 
ping, sign on, savvy it manageer, organization, indentity security, knowledge management, enterprise applications, data management
    
Ping Identity
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Mar 26, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
identity management, idaas, cloud applications, ibm cloud identity
    
Group M_IBM Q1'18
Published By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : 
operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure
    
Splunk Inc.
Published By: Oracle     Published Date: Jan 22, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : 
marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: HP Enterprise System     Published Date: Apr 03, 2014
SAP HANA is a powerful, in-memory computing platform that streamlines business suite applications, analytics, planning, predictive analysis, and sentiment analysis on a single platform, so businesses can operate in real time. The design approach for enterprise-level solutions involving SAP HANA, and the best practices surrounding them, isnt intrinsically different from the approach to any other enterprise-level solution for technology implementations. This paper is written to address those elements of good solution design and apply them to the SAP landscape, with particular focus on the SAP HANA element.
Tags : 
sap hana, as a service solution, solutions, cost effective, operational management, accelerate value, enterprise applications, data management
    
HP Enterprise System
Published By: Epicor     Published Date: Jun 22, 2015
If youre like most corrugated packaging manufacturers, your company operates multiple plants where each plant uses a different enterprise resource planning (ERP) system. This arrangement of multiple ERP systems could be costing you valuable time and money and promoting inefficiencies such as manual data entry. Upgrading to a single ERP system designed for multi-plant operations can help you solve these issues and more. View this whitepaper for eight ways to improve efficiencies with a single ERP system designed for multi- plant operations
Tags : 
erp system, corrugated packaging manufacturers, business operations, manual data entry, enterprise applications
    
Epicor
Published By: ASME     Published Date: Oct 22, 2019
Overmolding is the plastic injection molding process of creating a single part using two or more plastic or elastomer materials. It can be utilized in your design to capture color contrasts, add flexibility or eliminate assembly. The overmolding process enables a broad range of functional and structural applications and can be used to help product designers achieve additional functionality or aesthetics that would otherwise not be practical. Download now to learn about helpful features and the top reasons to overmold.
Tags : 
    
ASME
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is an expanding part of IT organizations strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDCs recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 but only 25% have reached the level that IDC would call mature that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cisco, cloud adoption, public cloud, private cloud, productivity, idc, cloudview survey, networking
    
Cisco
Published By: Logicalis     Published Date: Aug 29, 2014
Download this whitepaper to learn 4 way your healthcare organization can benefit from a healthcare access solution.
Tags : 
logicalis, healthcare access solution, healthcare it, hit, virtual desktop infrastructure, single sign on, byod, managed services
    
Logicalis
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. Data is suddenly everywhere, and so are the number of people, access points and administrators who can control or worse, copy the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
Bitium
Published By: Cisco     Published Date: Jan 16, 2015
The term perfect storm is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers
    
Cisco
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.