Standards  >  

Directory Access Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Directory Access ProtocolsMultimedia (View All Report Types)
 
Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

SmartDL 4.0, Dynamic Group Management
sponsored by Imanami
TRIAL SOFTWARE: Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution.
Posted: 02 Apr 2007 | Premiered: 01 Aug 2006

Imanami

Changes in Financial Management Systems and Regulations
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014

Workday

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Keeping Sensitive Data Accessible and Secure via Mobile Devices
sponsored by Raytheon Trusted Computer Solutions
PODCAST: In this exclusive podcast, join industry experts Brian and Jack Madden as they take an in-depth look at a new technology called virtual mobile infrastructure (VMI) which is like VDI, except with virtual machines that mimic mobile devices, enabling more centralized management and dramatically improved accessibility.
Posted: 30 May 2014 | Premiered: May 30, 2014

Raytheon Trusted Computer Solutions

Great Customer Service Takes off at WestJet
sponsored by IBM
VIDEO: Learn why WestJet turned to IBM Security Identity and Access Management to gain a better understanding of its guests.
Posted: 09 Oct 2014 | Premiered: 24 Oct 2013

IBM

MDM Solutions for Dummies: Product Integration
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question two featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space: Can your product integrate with enterprise infrastructure elements? Find out what these vendors have to say by accessing their answers to this question now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Enabling Collaboration: How IT Can Empower Users and Maintain Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
VIDEO: This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Acronis

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
VIDEO: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: 19 Feb 2014

Imperva

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: The convergence of storage and data center networks, the proliferation of mobile devices, the growing need for always on communications and access to data, and the emergence of cloud computing have all profoundly transformed the demand placed on the network and how it runs.
Posted: 22 Mar 2012 | Premiered: 22 Mar 2012

SearchNetworking.com

Secure Mobile Printing with UniPrint
sponsored by Citrix Ready and UniPrint
WEBCAST: In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.
Posted: 03 Oct 2014 | Premiered: Oct 3, 2014

Citrix Ready and UniPrint

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Podcast: Mobilizing Enterprise Data with Citrix ShareFile & Microsoft Azure
sponsored by Citrix
PODCAST: Every IT organization wants to maintain control of its data, while still ensuring a great end-user experience. Especially today, when users expect to be able to access their data and files from anywhere, at any time, this isn't easy. What tools and strategy do you need to deliver on these expectations?
Posted: 26 Oct 2014 | Premiered: Oct 20, 2014

Citrix

Mobilizing Enterprise Data with Citrix ShareFile & Microsoft Azure
sponsored by Citrix
WEBCAST: Every IT organization wants to maintain control of its data, but users today expect to be able to access their data and files from anywhere, at any time. So what tools and strategy do you need to deliver on these expectations?
Posted: 26 Oct 2014 | Premiered: Oct 20, 2014

Citrix

The Challenge: Enabling A Mobile Workforce
sponsored by Raytheon Trusted Computer Solutions
WEBCAST: This exclusive webcast examines a mobile content enablement solution that provides your mobile workforce with secure access to critical information and data, allowing them to do their jobs efficiently and effectively.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Raytheon Trusted Computer Solutions

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Decode MDM Solution Features: Must haves for security management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation.  End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 19 Sep 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

Opportunities with VMware and VMware Horizon 6
sponsored by Avnet Technology Solutions
WEBCAST: Today, end users are leveraging new types of devices for work, accessing Windows applications alongside non-Windows-based applications, and are more mobile than ever.
Posted: 09 Sep 2014 | Premiered: Aug 28, 2014

Avnet Technology Solutions

Mobile Device Management IT Decision Center: Operating Systems
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: SearchSecurity.com’s expert resource asks: Does your product support any OEM extensions (e.g., Samsung SAFE)? Do you require or offer agent applications installed on managed devices? Find out what top vendors have to say by accessing their answers to these questions now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Sync for CommVault Edge™
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Watch this concise webcast to find out how one vendor's sync software can help you.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

CommVault Systems, Inc.

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement