Standards  >  

Directory Service Standards

RSS Feed    Add to Google    Add to My Yahoo!
Directory Service Standards Multimedia (View All Report Types)
SmartDL 4.0, Dynamic Group Management
sponsored by Imanami
TRIAL SOFTWARE: Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution.
Posted: 02 Apr 2007 | Premiered: 01 Aug 2006


Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010


IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010


Network Evolution University: Video Conferencing and Collaboration
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, our experts examines how desktop video is enabling the focus on collaboration, best practices for using desktop video, and policies to manage its use and protect the network.
Posted: 19 Mar 2013 | Premiered: 19 Mar 2013

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Your Guide to Business Email Compromise
sponsored by Agari
PRODUCT DEMO: Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.
Posted: 19 Oct 2016 | Premiered: 19 Oct 2016


DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks University: Why SSL Certificate Security Matters
sponsored by
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016


Protecting mobile devices - Best practices
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016


Network Evolution University: Unified Wired and Wireless
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013

Architecting Active Directory Federation across Office 365, Azure and On Premises IT
sponsored by Rackspace
WEBCAST: Access this webcast to hear IT leaders discuss identity models and identity architecture in Azure AD/Office 365. Additionally, learn considerations for choosing an Active Directory Federation Service (ADFS), implementation scenarios, and what you need to know to implement ADFS.
Posted: 04 May 2016 | Premiered: Sep 15, 2015


Infrastructure Automation - Cognizant Infrastructure Services
sponsored by Cognizant Technology Solutions
VIDEO: In this concise two minute video, you will learn about how a service provider helped this company transform their IT operations through a four phase approach in order to better support their current business model, as well as enable a new level of business performance and innovation.
Posted: 12 Oct 2016 | Premiered: 28 Jan 2016

Cognizant Technology Solutions

Extending ITSM Value Beyond IT with PPM
sponsored by ServiceNow
VIDEO: In this brief video, Katie Irvine, Senior Operations Analyst at Standard Life, explains how they extended the value of their ITSM platform to support Project and Portfolio Management. Tune in to learn how you can achieve similar benefits.
Posted: 26 Feb 2016 | Premiered: 26 Nov 2015


Why You Should Care about Identity-as-a-Service (iDaaS): An Expert's Perspective
sponsored by Rackspace
WEBCAST: This webcast defines identity-as-a-service in the context of real-world applications, and identifies the key capabilities it can provide, including credential management, claims issuance and acceptance, assurance of compliance, personalization information maintenance, and more.
Posted: 04 May 2016 | Premiered: Dec 31, 2015


Threat intelligence
sponsored by
VIRTUAL ENVIRONMENT: This security school looks at what a threat intel service can and cannot provide and discusses the status of the new(ish) standards for intelligence exchange.
Posted: 20 Jan 2016 | Premiered: 15 Jan 2016

Market Perspectives: The Benefits of Improving RTOs
sponsored by Commvault
VIDEO: In this brief video, IDC research director Phil Goodwin shares the findings of a recovery time objective survey. Find out which company was able to cut unplanned downtime by more than 50% to produce unprecedented cost savings and provide more reliable availability of data.
Posted: 13 Oct 2016 | Premiered: 08 Mar 2016


Ensure the Quality of Big Data For Actionable Customer Insights
sponsored by Melissa Data Corp
PRODUCT DEMO: Learn how entity extraction and data standardization can help you clean up masses of big data to ensure trustworthiness, and how pairing customer databases with authoritative reference data can help you understand what customers want to buy, what they have bought already, and their sentiments towards your products.
Posted: 07 Oct 2016 | Premiered: 07 Oct 2016

Melissa Data Corp

Accelerate App Development with Open Source PaaS
sponsored by Red Hat
VIDEO: In this video, discover a cloud application platform as a service (PaaS) that enables developers to create scalable applications using whichever programming language and middleware they prefer. Watch now to explore the benefits and capabilities of this PaaS.
Posted: 27 Mar 2014 | Premiered: 11 Jul 2013

Red Hat

Data Center Consolidation & Cloud Transformation - Cognizant
sponsored by Cognizant Technology Solutions
VIDEO: In this informational video, see how a US-based diversified 'media, information and services' company aimed to consolidate its data center while also focusing on potential cost savings, operations improvement, flexibility, and security by moving to cloud based solutions.
Posted: 12 Oct 2016 | Premiered: 11 May 2016

Cognizant Technology Solutions

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Helping WWF create a sustainable workspace for the future
sponsored by Dimension Data
VIDEO: The WWF had an ambitious goal of creating a sustainable IT workspace for the future—it wasn't going to be easy as they needed to virtually rebuild the way they conducted their operations. This video case study explores how they we able to meet their goals by implementing the right data center solution and getting help from Dimension Data.
Posted: 06 Mar 2015 | Premiered: 06 Mar 2015

Dimension Data

CW+: Analyst's take: Alfabet PlanningIT reaps rewards for decision makers
sponsored by
WEBCAST: When organizations adopt Alfabet’s planningIT, decision makers have more knowledge about their operating environments and use this information to leverage existing assets and avoid unnecessary investments in software or development.
Posted: 26 Oct 2011 | Premiered: Jan 10, 2011

Quest Recovery Manager for Active Directory - Tips and Tricks
sponsored by Dell Software
WEBCAST: Are you using Quest Recovery Manager for Active Directory to its full potential? We have a Webcast that will show you some of the great things that Recovery Manager has to offer.
Posted: 06 Nov 2006 | Premiered: Nov 3, 2006

Dell Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement