ComputerWeekly.com Research Library

Powered by Bitpipe.com

Directory Services White Papers

  • Comparing Azure Active Directory options

    Sponsored by: TechTarget ComputerWeekly.com

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • 5 types of data security

    Sponsored by: TechTarget ComputerWeekly.com

    Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

  • Active Directory Maintenance & Cleanup

    Sponsored by: STEALTHbits Technologies

    Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.

  • Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones

    Sponsored by: BlackBerry

    Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption.

  • Stikeman Elliott LLP: IT Team Offers Legal Team More Functionality in their BlackBerry Smartphones

    Sponsored by: BlackBerry

    Access this case study to learn how a busy, mobile legal team successfully developed a Blackberry application to easily look up contact lists, access internal information about their firm and have an emergency communications system in place.

  • Better Leveraging Active Directory

    Sponsored by: Radiant Logic, Inc.

    Find out how your business can have a better and more efficient identity management system in this white paper.

  • Top Ten Ways To Get More From Your SharePoint Deployment

    Sponsored by: Radiant Logic, Inc.

    Check out this white paper to see how identity and context virtualization delivers integrated identity, a richer security profile, and contextual search across all your data.

  • Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories

    Sponsored by: Radiant Logic, Inc.

    This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.

  • Solution Summary  - Secure Cloud

    Sponsored by: Radiant Logic, Inc.

    This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.

  • Directory Services Integration with Database Enterprise User Security

    Sponsored by: Oracle Corporation

    This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.