LDAP White Papers
-
A Computer Weekly buyer’s guide to hybrid cloud
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth
Sponsored by: IBMApplication security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust.
-
Better Leveraging Active Directory
Sponsored by: Radiant Logic, Inc.Find out how your business can have a better and more efficient identity management system in this white paper.
-
Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
Sponsored by: Radiant Logic, Inc.Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
-
Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
Sponsored by: Radiant Logic, Inc.This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
-
Solution Summary - Secure Cloud
Sponsored by: Radiant Logic, Inc.This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
-
Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
Sponsored by: GoGridSo you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Storage Networking Case Study: How Cisco IT Uses a SAN to Automate the Legal Discovery Process
Sponsored by: Cisco Systems, Inc.This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
-
Focus Solution Profile: Qumranet
Sponsored by: Qumranet Inc.Qumranet is bringing to the market a solution that is optimized specifically for desktop deployment using a virtual desktop architecture leveraging the KVM hypervisor native in the Linux kernel.
-
Directory Services Integration with Database Enterprise User Security
Sponsored by: Oracle CorporationThis paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.
-
Two Billion Entry Directory Benchmark
Sponsored by: Oracle CorporationThis benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
-
Eliminating Notes ID File Password Management: A Ground-breaking Alternative
Sponsored by: PistolStar, Inc.Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
-
Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
Sponsored by: Symantec CorporationServer provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.