e-mail Protocols

e-mail Protocols Reports
E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth
sponsored by IBM
EGUIDE: Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

Using Microsoft Active Directory in the Domino World
sponsored by PistolStar, Inc.
WHITE PAPER: Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

PistolStar, Inc.

A Computer Weekly buyer’s guide to hybrid cloud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

ComputerWeekly.com

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

Directory Services Integration with Database Enterprise User Security
sponsored by Oracle Corporation
WHITE PAPER: This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Oracle Corporation

Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
sponsored by GoGrid
PRESENTATION TRANSCRIPT: So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
Posted: 12 Aug 2010 | Published: 12 Aug 2010

GoGrid

eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE: This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009

Information Security Magazine

Storage Networking Case Study: How Cisco IT Uses a SAN to Automate the Legal Discovery Process
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Cisco Systems, Inc.

Eliminating Notes ID File Password Management: A Ground-breaking Alternative
sponsored by PistolStar, Inc.
WHITE PAPER: Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

PistolStar, Inc.

Focus Solution Profile: Qumranet
sponsored by Qumranet Inc.
PRODUCT LITERATURE: Qumranet is bringing to the market a solution that is optimized specifically for desktop deployment using a virtual desktop architecture leveraging the KVM hypervisor native in the Linux kernel.
Posted: 20 May 2008 | Published: 01 May 2008

Qumranet Inc.