Protocol Survey Customer DirectoryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Protocol Survey Customer Directory returned the following results.
RSS What is RSS?
Related Categories

 •   Network Management
 •   Customer Service (General)
 •   Customer Relationship Management (CRM)
 •   Data Security
 •   Business Intelligence Solutions
 •   Networks
 •   Authentication / Password Management
 •   Customer Experience Management (CEM)
 •   Customer Information Management/ Customer Databases
 •   VPN, Extranet and Intranet Solutions

Related Searches
 •   Active Protocol
 •   Devices Protocol Survey
 •   Protocol Desktops
 •   Protocol Roi
 •   Protocol Survey Customer Webcasts
 •   Protocol Survey History
 •   Protocol Survey Rfp
 •   Statement Protocol Survey
 •   Unix Protocol
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

The Top 9 Ways to Improve Customer Loyalty and Engagement by Allegiance

January 2008 - (Free Research)
Customer loyalty is a critical way to retain more of your customers and grow your business faster. Explore these nine principles to foster a culture of greater loyalty and engagement and you will see immediate profits. 
(WHITE PAPER) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

Identity Simplification and Consolidation through Virtualization and Synchronization by Agilysys-Sun Technology Solutions

March 2009 - (Free Research)
You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers by Sendmail, Inc.

October 2008 - (Free Research)
This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure. 
(PODCAST) READ ABSTRACT |

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

Core Network Services Survey: The Costs and Impacts of DNS and IP Address Management (IPAM) for the Enterprise and SMB by Infoblox

October 2008 - (Free Research)
Computerworld invited IT and business leaders to participate in a core network services survey that included specific questions about their DNS infrastructures and the costs of IP address management. The following report represents top-line results of that survey and can be used as a benchmark to measure your organization’s core network services. 
(ANALYST REPORT) READ ABSTRACT |

SIP and the Art of Converged Communications by Global Knowledge

June 2013 - (Free Research)
Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. This white paper is going to look at the way SIP is used in the converged Unified Communications environment. 
(WHITE PAPER) READ ABSTRACT |

DataNAS XP by Excel Meridian Data, Inc.

The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses. 
(HARDWARE PRODUCT)

Meet HDAP: Directory Innovation Based on Big Data Technology by Radiant Logic, Inc.

May 2014 - (Free Research)
View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments. 
(WEBCAST) READ ABSTRACT |

Meet HDAP: The World's First Large-Cluster, Elastic LDAP v3 Directory Built on "Big Data" Standards by Radiant Logic, Inc.

June 2014 - (Free Research)
This white paper reveals the advantages HDAP has over LDAP and why it is a better fit for enterprise identity management. 
(WHITE PAPER) READ ABSTRACT |

Migrating from Netware to Active Directory by Dell Software

July 2010 - (Free Research)
In this new Quest Software white paper, get the facts on a safe and secure migration from NetWare. Learn the reasons why now really is the best time to put a migration plan together, and discover how automated migration tools make the job easy, accurate and fast. Read this valuable white paper today. 
(WHITE PAPER) READ ABSTRACT |

Taking a SIP: What Executives Should Know about IP Transformation in the Contact Center by Genesys

September 2008 - (Free Research)
This white paper is intended for executives who are seeking to understand why SIP (Session Initiation Protocol) is a must-have technology for the contact center today, and how SIP-enabled IP solutions can help align you with your goals. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Directory Services Integration with Database Enterprise User Security by Oracle Corporation

April 2008 - (Free Research)
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment. 
(WHITE PAPER) READ ABSTRACT |

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

Defender 5 by Dell Software

Defender offers the essential security you need to conduct your e-business with confidence, safe in the knowledge that your critical digital assets, customers and employees are protected by reliable, future-proof software. 
(ASP & SOFTWARE PRODUCT)

Closing the security gap: 2012 IOUG enterprise data security survey by Oracle Corporation UK Ltd

April 2013 - (Free Research)
This exclusive paper surveys 350 data center managers to find out what the most prevalent threats are to data security today. Discover what your peers are doing to overcome these challenges, and learn helpful strategies for safeguarding your critical information. 
(WHITE PAPER) READ ABSTRACT |

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement by Attachmate Corporation

August 2010 - (Free Research)
Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Solution Summary  - Secure Cloud by Radiant Logic, Inc.

February 2011 - (Free Research)
This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds. 
(WHITE PAPER) READ ABSTRACT |

The Top 5 VoIP Problems and How to Solve Them by Fluke Networks

September 2010 - (Free Research)
This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem. 
(WHITE PAPER) READ ABSTRACT |

Accenture Technology Vision 2014 by ComputerWeekly.com

January 2014 - (Free Research)
The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Implementing an identity management solution by SAP America, Inc.

June 2008 - (Free Research)
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts