Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Active Directory Security in the world of UNIX

Infelizmente o evento Active Directory Security in the world of UNIX já expirou.

Você também pode se interessar por.

Securely Managing Your Unix Environment
Leia o White Paper
Securely Managing Your Unix Environment
Securely Managing Your Unix Environment
With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems, Unix-based organizations face many identity and access management (IAM) challenges.
Leia o White Paper
The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
Leia o White Paper
The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
AD bridge solutions address this problem by enabling Unix, Linux, and Mac OS X systems to participate as “full citizens” in Active Directory.
Leia o White Paper
Gerenciamento de usuários Zero Trust e Smartfactor com One Login
Webcast sob demanda
Gerenciamento de usuários Zero Trust e Smartfactor com One Login
Gerenciamento de usuários Zero Trust e Smartfactor com One Login
Usando One Login com SmartFactor, podemos melhorar significativamente a segurança da autenticação e reduzir a possibilidade de fraude ou roubo de credenciais, melhorando a experiência do usuário.
Assista ao webcast
Five IAM practices that will help you succeed with GDPR
E-book
Five IAM practices that will help you succeed with GDPR
Five IAM practices that will help you succeed with GDPR
Five IAM practices that will help you succeed with GDPR | Our eBook explains the what, why and how of the European Union’s General Data Protection Regulation (GDPR)?
Read E-book
The Guardian at the Gate in your Identity Defenses On Demand
On Demand Webcast
The Guardian at the Gate in your Identity Defenses On Demand
The Guardian at the Gate in your Identity Defenses On Demand
Privileged access management (PAM) remains your strongest defense against both internal and external threats.
Watch Webcast