Skip to main content
 

single sign authentication

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.
Tags : 
    
Group M_IBM Q418
Published By: Okta     Published Date: Nov 09, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO. Download this white paper to learn more!
Tags : 
    
Okta
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: Okta     Published Date: Jul 27, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
Innovative Identity and Access Management That Actually Makes Life Easier Empower employees, customers and partners with secure access to cloud and company apps on any device. Transform your enterprise security and centralize control of users and apps. OneLogin’s cloud identity management platform provides secure single sign-on, multi-factor authentication, directory integration with AD, LDAP and other external directories, user provisioning, endpoint management and more.
Tags : 
    
OneLogin
Published By: Group M_IBM Q418     Published Date: Oct 16, 2018
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
Tags : 
    
Group M_IBM Q418
Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Okta     Published Date: Nov 09, 2015
You’re moving towards Office 365 and you want true single sign-on and secure authentication using AD for users. Read this eGuide to learn the top three reasons to consider Okta instead of Microsoft’s ADFS.
Tags : 
okta, office 365, okta vs microsoft, adfs, secure authentication
    
Okta
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata
    
Imprivata
Published By: Imprivata     Published Date: Sep 17, 2007
Single Sign-On technology has been around for many years. Although skepticism and risk worries were associated with the service, SSO has gone through technological changes. Through these changes it has become an ROI Solution for many corporations. Learn and explore first hand through five different companies how SSO has helped achieve their goals.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, authentication, imprivata
    
Imprivata
Published By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : 
sso, single sign on, user management, authentication, identity management, imprivata, ppi
    
Imprivata
Published By: Imprivata     Published Date: Aug 21, 2009
This white paper is intended to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
Tags : 
enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata
Published By: Imprivata     Published Date: Aug 21, 2009
Enterprise Single Sign-On (ESSO) has emerged with a similar potential to transform enterprise security. This white paper takes a closer look at ESSO, the problems it solves, and how it will fundamentally change the way corporations address their security needs.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata
Published By: Okiok     Published Date: Aug 21, 2009
To successfully deploy Single Sign-On today, most organizations have a set of key requirements that must be met. Here are some tips on how focal Point can help organizations seeking Single Sign-On meet those requirements.
Tags : 
single sign on, sso, sso deployment, single sign on deployment, authentication, identity management, okiok
    
Okiok
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos, open ssh
    
Likewise Software
Search      

Add Research

Get your company's research in the hands of targeted business professionals.