Active Directory

Active Directory is an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy programs to many computers, and apply critical updates to an entire organization. An Active Directory stores information and settings relating to an organization in a central, organized, accessible database.
Results 1 - 25 of 35Sort Results By: Published Date | Title | Company Name
By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
     JumpCloud
By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas, active directory
     JumpCloud
By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : leveraging, visualization, optimizing, processes, technology, optimizing, server utlization, storage, data management, active directory, bandwidth management, convergence, infrastructure, interoperability, local area networking, network architecture, network management, network performance, network performance management, network provisioning
     SunGard
By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft, governance, grid computing, infrastructure
     ZScaler
By: ScriptLogic     Published Date: Nov 14, 2011
This whitepaper discusses the challenges of native tools and the 7 key capabilities that you need so that you can effectively audit Active Directory.
Tags : active directory, auditing, native tools, centralized, data, secure, database, compliance, configuration management, data integration, data protection, database security, soap, service oriented architecture, productivity, project management, software compliance, sarbanes oxley compliance, service management, desktop management
     ScriptLogic
By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa, it process automation, security, active directory management, data protection, information security, identity management, identity and access management, staffing, provisioning, threat, iam, privilege delegation
     NetIQ
By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories, spam, archive, archiving, instant, backup, mail, white, paper, whitepaper, migration, disaster, recovery
     Osterman Research, Inc.
By: NetIQ     Published Date: Dec 23, 2010
This paper is broken into two main sections: a presentation and analysis of the survey results, and a discussion of why organizations must be able to manage, and administer Active Directory environments securely and successfully.
Tags : netiq, microsoft active directory management, security survey, active directory, security management
     NetIQ
By: NetIQ     Published Date: Dec 23, 2010
This white paper outlines seven common challenges associated with securely administering Active Directory and provides some helpful insight into what NetIQ can do to assist you with these difficulties.
Tags : netiq, active directory administration, enterprise, active directory, enterprise software
     NetIQ
By: Okta     Published Date: Dec 15, 2010
This paper focuses on the challenges of integrating Salesforce.com logins for single sign-on (SSO) and automating provisioning/de-provisioning from on-premise directories like Active Directory.
Tags : okta, user management automation, single sign-on, salesforce.com, active directory, access management, application administrator, application integration, access control, business process automation, cloud computing
     Okta
By: Okta     Published Date: Oct 18, 2010
This paper will discuss three different options for integrating Active Directory with your SaaS applications and analyze how effectively they meet the requirements above.
Tags : okta, active directory integration, saas applications, software as a service, smb, identity management, iam, active directory, google apps, saas, cloud, sso, saml, network management, small business networks, application integration, cloud computing
     Okta
By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : okta, cloud area network, scaling saas applications, security, identity management, iam, active directory, google apps, saas, cloud, sso, saml, security management, application integration, cloud computing
     Okta
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, sox, sarbanes-oxley, hipaa, glba, pci, cross-platform, auditing, logging, security, rbac, entitlements, privilege management
     Centrify Corporation
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
     Centrify Corporation
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
     Centrify Corporation
By: SWsoft     Published Date: Aug 21, 2009
Today's IT organizations are dealing with the consequences of exploring IT Infrastructure growth and complexity. With its growing complexity and volume, the cost of managing the infrastructure from simple patch management to skill sets requirements for IT administrators is increasing.
Tags : active directory, bandwidth management, convergence, swsoft, server virtualization, patch management, network management, infrastructure, it management, virtuozzo, sw soft
     SWsoft
By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
     JumpCloud
By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas, active directory
     JumpCloud
Previous   1 2    Next    
Search White Papers