Electronic Mail Directory Service Protocols Reports

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth
sponsored by IBM
EGUIDE: Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

Using Microsoft Active Directory in the Domino World
sponsored by PistolStar, Inc.
WHITE PAPER: Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

PistolStar, Inc.

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE: This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009

Information Security Magazine

Solution Summary  - Secure Cloud
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
sponsored by Radiant Logic, Inc.
WHITE PAPER: Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
Posted: 15 Mar 2011 | Published: 14 Mar 2011

Radiant Logic, Inc.

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
sponsored by GoGrid
PRESENTATION TRANSCRIPT: So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
Posted: 12 Aug 2010 | Published: 12 Aug 2010

GoGrid

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security