INFOGRAPHIC:
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
EGUIDE:
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust.
WHITE PAPER:
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
WHITE PAPER:
This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
WHITE PAPER:
Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
WHITE PAPER:
This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
WHITE PAPER:
Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
WHITE PAPER:
This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
CASE STUDY:
This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
PRESENTATION TRANSCRIPT:
So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.