Standards  >  

Directory Access Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Directory Access Protocols Multimedia (View All Report Types)
Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

SmartDL 4.0, Dynamic Group Management
sponsored by Imanami
TRIAL SOFTWARE: Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution.
Posted: 02 Apr 2007 | Premiered: 01 Aug 2006


Changes in Financial Management Systems and Regulations
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014


IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010


Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010


How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Can Directory Services Simplify AD Management?
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive expert webcast, learn more about the identity challenges associated with Active Directory. View now to uncover the steps your organization needs to take to strengthen you IAM strategy and improve overall security.
Posted: 10 Sep 2015 | Premiered: Aug 26, 2015

Radiant Logic, Inc.

The Top Drivers of WLAN Deployment
sponsored by Cisco
VIDEO: In a rush? Access this brief video to quickly and easily pinpoint the information you need to learn what's driving the mobile workforce, and how a WLAN deployment can help.
Posted: 23 Oct 2015 | Premiered: 23 Oct 2015


Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Webinar: Identity Provisioning in Office 365 and Azure AD
sponsored by Ping Identity Corporation
WEBCAST: Organizations need to determine which strategy will best fit their circumstances. In this webinar, industry insiders discuss different ways to handle IAM for Office 365 users and provide a simple, comprehensive SSO experience. View now to reveal how to eliminate identity synchronization complexity.
Posted: 26 Oct 2015 | Premiered: Sep 16, 2015

Ping Identity Corporation

Adding Macs to Your Enterprise? Start with Identity Management
sponsored by Centrify Corporation
WEBCAST: Watch this on-demand webinar to learn how to securely integrate Macs into your corporate environment.
Posted: 03 Nov 2015 | Premiered: May 28, 2015

Centrify Corporation

Cloud-Based Communication Case Study: Upgrading TheLadders
sponsored by ThinkingPhones
WEBCAST: In this webcast case study, Nick Giordano, Technical Support Specialist at TheLadders, explains how his organization upgraded their infrastructure by transitioning from a legacy system to cloud-enabled business communications through a third-party service.
Posted: 01 Sep 2015 | Premiered: Aug 10, 2015


How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Select and Implement a Managed File Transfer Solution
sponsored by Linoma Software
VIDEO: This short video introduces a managed file transfer system that secures data from unauthorized access and creates a record of who has controlled the file.
Posted: 29 Oct 2015 | Premiered: 07 Oct 2015

Linoma Software

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Leverage Videoconferencing to Improve Enterprise Collaboration
sponsored by VBrick
VIDEO: In this webcast, Irwin Lazar, VP and Service Director at Nemertes Research, takes an in-depth look at how to leverage videoconferencing to improve enterprise collaboration. Learn how to implement successful videoconferencing strategies in your organization.
Posted: 03 Nov 2015 | Premiered: 02 Nov 2015


Macs in the Wild: Securing Your Mobile Workforce and Their Devices
sponsored by Centrify Corporation
WEBCAST: This webinar, presented by Jason Snell, Editor in Chief with Six Colors, and Peter Havens, Director of Product Management with Centrify, teaches you how to set up a strong defense against would be device, identity and data theft for your mobile workforce.
Posted: 03 Nov 2015 | Premiered: Sep 4, 2015

Centrify Corporation

Go Wireless within Minutes
sponsored by Cisco
VIDEO: This brief video explains how to set up a robust WiFi network for your small- to medium-sized business, all under 10 minutes. Learn how to make this possible for your organization with a limited IT department (or even none at all.)
Posted: 22 Oct 2015 | Premiered: 22 Oct 2015


Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Building a More Reliable Network in the Digital Age
sponsored by XO Communications
WEBCAST: Access this short video now to learn how you can upgrade to a future-proof network with unified communications for greater visibility and control over bandwidth.
Posted: 08 May 2015 | Premiered: Apr 24, 2015

XO Communications

STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015


Catalyst for Change in Government Health and Social Programs
sponsored by IBM
WEBCAST: Access this in-depth webinar for a look into the world of health and social programs, and how governments can tap the information they are being given. View now to see how coordination and collaboration is essential, and how extensive use of data is your secret to success.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015


Solving Performance Issues Impacting Citrix-based Services with Continuous Real-Time Performance Analytics
sponsored by Citrix and Netscout
WEBCAST: This webinar will explore the challenges of Service Assurance for IT professionals managing multiple critical business applications and Unified Communications in Citrix environments.
Posted: 03 Nov 2015 | Premieres: Dec 3, 2015

Citrix and Netscout

Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


Top 5 Considerations for Moving Workloads to the Cloud
sponsored by VMware
WEBCAST: This whitepaper covers five things you should consider when deciding what workloads are appropriate for the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 25, 2014


Improving Storage Performance in VDI Environments
sponsored by Infinio
WEBCAST: This white paper details how to improve the storage performance of virtual desktops. Read on to learn about the best ways to improve user experience, reduce storage costs, eliminate downtime, and more.
Posted: 02 Oct 2015 | Premiered: Oct 2, 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement