Single Sign-on (SSO): Truths and Myths

Technology products always seem to come out strong, and then wither under intense scrutiny. This was the case with single sign-on (SSO). However, any product driven by strong need will reinvent itself to address the problems it contains. With SSO, a number of myths have now been exploded. Find out why it may be time for you to evaluate SSO for your company. Myth #1: You can’t get true SSO.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the basics of VoIP by reading this white paper, which includes explanations of coding and protocol for VoIP, and a look at quality and myths about VoIP.
  • Written By:
  • Published On:

The Shortcut Guide to Achieving Business Intelligence in Midsize Companies

This guide introduces you to the key concepts of business intelligence, including data modeling, data warehouses, online analytical processing (OLAP), and more. The author debunks many of the prevailing myths that scare small to medium businesses from investigating the use of business intelligence, and explains how the very same techniques and technologies used by massive enterprises are now available to them.
  • Written By:
  • Published On:

BYOD Without Tears: The Impact and Challenge for Network Engineers

Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security concerns can arise when employees want to use their personal devices at work. This white paper looks at the challenges of integrating BYOD with corporate networks in a way that BYOD does not compromise connectivity or performance for established wired and wireless users.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Smart Enterprise Single Sign-on (ESSO)

The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.
  • Written By:
  • Published On:

10 Business Benefits of Identity Cloud

Providing single sign-on (SSO) to web applications and portals is more critical than ever. IT must manage identity and access to web applications and demonstrate compliance. This once required expensive infrastructure software and much time to deploy. With cloud-delivered identity services, companies can realize immediate benefit from an investment without installing and maintaining more software. Learn more.
  • Written By:
  • Published On:

Day One Employee Productivity and Increased Security: Integrated Provisioning and SSO

Increasing user productivity is an ongoing challenge for many companies. While an abundance of online information and applications is available to them, facilitating fast and secure access to the information can be a complex task. An integrated provisioning and single sign-on (SSO) solution provides secure access to the network from the moment an employee starts the job—enabling full productivity from day one.
  • Written By:
  • Published On: