Security Assertion Markup Language Reports

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008

Oracle Corporation

The future of email and applications is social
sponsored by IBM
WHITE PAPER: While it's difficult to imagine a workplace without email, today many businesses are coping with information overload. Email is a key factor of business collaboration tools, so businesses need to find a way to modify information management. View this white paper to learn more about what the future of email application entails.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

IBM

Modernize Your Approach to Authentication
sponsored by TechTarget Security
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

TechTarget Security

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

CW Benelux - August-October 2022: Belgium seeks top tech talent
sponsored by TechTarget ComputerWeekly.com
EZINE: The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.
Posted: 28 Jul 2022 | Published: 11 Aug 2022

TechTarget ComputerWeekly.com

5 steps for a smooth ECM implementation
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
Posted: 25 Oct 2022 | Published: 06 Oct 2022

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com