OneSign Authentication FunctionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: OneSign Authentication Functions returned the following results.
RSS What is RSS?
Related Categories

 •   Authentication / Password Management
 •   Access Control
 •   Identity Management/ User Provisioning
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Application Security
 •   Virtualization

Related Searches
 •   Ecommerce OneSign
 •   Latest OneSign Authentication Functions
 •   Network OneSign
 •   Notes OneSign Authentication Functions
 •   OneSign Authentication Functions Manage
 •   OneSign India
 •   OneSign Java
 •   OneSign Make
 •   Report OneSign Authentication Functions
Advertisement

ALL RESULTS
1 - 25 of 445 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption by Imprivata

April 07, 2011 - (Free Research)
This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray. 
(WHITE PAPER) READ ABSTRACT |

3 Steps to Faster EMR Adoption with Desktop Virtualization and SSO by VMware, Inc.

January 11, 2012 - (Free Research)
This white paper outlines three key steps that your organization can take to accelerate EHR and CPOE adoption. Read on to discover out how to make it faster and easier to deploy new clinical applications while optimizing the clinician experience, protecting patient data, and reducing cost and complexity. 
(WHITE PAPER) READ ABSTRACT |

The Seattle Times Meets with Imprivata OneSign™ Deadlines and Security Needs by Imprivata

January 2008 - (Free Research)
With OneSign up and running, The Seattle Times saw an immediate improvement in its security policy enforcement. 
(CASE STUDY) READ ABSTRACT |

Imprivata OneSign Streamlines Workflows at Augusta Health by Imprivata

June 2013 - (Free Research)
This brief video explores how Augusta Health leveraged a single sign on technology to increase care providers' efficiency while also improving the protection of patients' confidential information. 
(VIDEO) READ ABSTRACT |

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming by VMware, Inc.

January 2012 - (Free Research)
Learn how to maximize electronic medical records (EMR) user adoption by providing fast, convenient, secure access to EMR data across multiple clients, where and when the clinician requests it. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Effective Network Access Control by Bradford Networks

December 2011 - (Free Research)
There is often confusion between the functions and benefits of 802.1X and those of commercially available NAC solutions. Which is best for particular networks? View now to explore the fundamentals of 802.1X and NAC technologies and why both is often required to provide the level of security, control and visibility needed in today’s network. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Password Authentication and Management: A Simple Solution by PistolStar, Inc.

June 2008 - (Free Research)
This paper delves into the world of password authentication and management, as passwords serve a very significant purpose, they have not been without their own set of issues and obstacles for organizations. 
(WHITE PAPER) READ ABSTRACT |

Defining Identity Management by Hitachi ID Systems, Inc.

June 2010 - (Free Research)
This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges. 
(WHITE PAPER) READ ABSTRACT |

The Key to Seamless SSO by Radiant Logic, Inc.

April 2014 - (Free Research)
This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection. 
(WHITE PAPER) READ ABSTRACT |

HP 3Par Secure Service Architecture by HP and Intel

February 2012 - (Free Research)
Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business. 
(WHITE PAPER) READ ABSTRACT |

Securing and Controlling Sensitive Data in the Cloud by Trend Micro

December 2012 - (Free Research)
This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

America's Quest for IPv6 - Part I: A Business Perspective by Command Information

June 2008 - (Free Research)
This paper emphasizes that American organizations must adopt IPv6 today and describes the features and functions that will keep them competitive on the global stage. 
(WHITE PAPER) READ ABSTRACT |

Eliminating Notes ID File Password Management: A Ground-breaking Alternative by PistolStar, Inc.

June 2008 - (Free Research)
Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP. 
(WHITE PAPER) READ ABSTRACT |

eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com

November 2008 - (Free Research)
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy. 
(EBOOK) READ ABSTRACT |

Who's Got the NAC? Best Practices in Protecting Network Access by Sophos, Inc.

February 2008 - (Free Research)
This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access. 
(WHITE PAPER) READ ABSTRACT |

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management by IBM

March 2009 - (Free Research)
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security. 
(DEMO) READ ABSTRACT |

Security Appliances: New Strides in Preventing Intrusions by IBM

February 2009 - (Free Research)
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff. 
(WHITE PAPER) READ ABSTRACT |

Avoiding Insider Threats to Enterprise Security by IBM

March 2013 - (Free Research)
In an increasingly cloud-based IT universe, concerns are being raised and addressed regarding the security of privileged and shared accounts. See this white paper for more information on the latest in cloud-based security for privileged identities. 
(WHITE PAPER) READ ABSTRACT |

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow by Sendmail, Inc.

October 2008 - (Free Research)
This white paper examines the architecture limitations prevalent in today's large-enterprise email networks. 
(WHITE PAPER) READ ABSTRACT |

How to select a KVM over IP system to assist with HIPAA compliance by Avocent

February 2008 - (Free Research)
Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

 Password Self Help – Password Reset for IBM i by Safestone Technologies

June 2011 - (Free Research)
Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals by Imprivata

December 2013 - (Free Research)
This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions. 
(WHITE PAPER) READ ABSTRACT |

You Are the Target - But You Don't Have To Be with Effective Authentication by RSA, The Security Division of EMC

August 2013 - (Free Research)
In this analyst report by Frost & Sullivan, uncover 5 case studies on organizations of all sizes that found passwords to be subpar in security measures. Learn how they benefited from a multi-factor authentication platform, which ensured that only authorized users could access their private, dynamic networks. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 445 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts