Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust.
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Qumranet is bringing to the market a solution that is optimized specifically for desktop deployment using a virtual desktop architecture leveraging the KVM hypervisor native in the Linux kernel.
So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.