Standards  >  

Directory Access Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Directory Access Protocols Multimedia (View All Report Types)
 
SmartDL 4.0, Dynamic Group Management
sponsored by Imanami
TRIAL SOFTWARE: Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution.
Posted: 02 Apr 2007 | Premiered: 01 Aug 2006

Imanami

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Prevent DNS Catastrophes: Learn Best Practices on Shoring Up DNS for 2017
sponsored by Neustar
VIDEO: Discover if your current DNS strategy stacks up to the next generation of internet demands. Learn why it makes sense to have a backup DNS provider, what IoT insecurities threaten your business, and more.
Posted: 27 Jan 2017 | Premiered: 20 Jan 2017

Neustar

Respond to Threats Faster and More Effectively Than Ever
sponsored by ServiceNow
WEBCAST: Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.
Posted: 30 Jan 2017 | Premiered: Jan 30, 2017

ServiceNow

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

6 Questions Every CIO Should Ask About Cloud Security
sponsored by IBM
WEBCAST: Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.
Posted: 10 Feb 2017 | Premiered: Feb 10, 2017

IBM

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Why Secure Information Exchange is Critical for Digital Transformation
sponsored by OpenText
WEBCAST: Information and data is fueling the digital transformation. Join senior analyst from Forrester Research, Heidi Shey as she breaks down the digital transformation, uncovers 3 key requirements for success and the benefits of secure information exchange.
Posted: 20 Feb 2017 | Premiered: Feb 20, 2017

OpenText

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Solving the DLP Puzzle: Tips for a Successful Deployment
sponsored by Intel Security
WEBCAST: Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is. Check out these tips and techniques to ease common DLP pain points, and explore migration use cases.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

The Time for a Broadband WAN is Now
sponsored by Silver Peak
WEBCAST: Access this webcast to learn how adopting a broadband connected WAN can improve your business.
Posted: 09 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Why You Should Care about Identity-as-a-Service (iDaaS): An Expert's Perspective
sponsored by Rackspace
WEBCAST: This webcast defines identity-as-a-service in the context of real-world applications, and identifies the key capabilities it can provide, including credential management, claims issuance and acceptance, assurance of compliance, personalization information maintenance, and more.
Posted: 04 May 2016 | Premiered: Dec 31, 2015

Rackspace

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Secure Cloud Access Reference Architecture & Use Model
sponsored by Intel
WEBCAST: This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).
Posted: 28 Feb 2011 | Premiered: Mar 17, 2011, 14:00 EDT (18:00 GMT)

Intel

Secure Voice Messaging: Top IT Priority
sponsored by AVST
WEBCAST: Secure voice messaging and call completion are the linchpins of modern business communications. Learn how AVST can help boost first-time call completion and offer secure voice messaging in this webcast.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement