SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
DSDSDSDSGuardianGuardianGuardianGuardian
Directory recovery
at the speed of your business
Leverage the power of your directory
and protect it with DSGuardian !
Marc Boitel, Ir
CEO OPNS
Everyone has understood that the future is in
the cloud, right ?
OK but Cloud under control or not ?
Do you want to define and control who may
access what in the Cloud ?
Do you want to define and control who may
access what from the Cloud ?
For everything ...
You want and need to keep internally your
user & privilege management (even if acceded
from the cloud by federation).from the cloud by federation).
NetIQ for example has the right tools to keep
your cloud (private, public or hybrid) under
control and safe enough from your side.
Amazing story...
Are you ready to take risks and expose your
company data to anyone on the web ?
By accident or deliberately by hackers (knowing
that most of them are internal employees)
Security is and will remain, regardless of the IT
evolution, a major topic.
Your directory is your secure repository of
your users and all related information
(attributes) like among others :
◦ Group membership
◦ Roles◦ Roles
◦ (Cloud) Access rights
◦ ...
Fact : Most of the companies rely today on an
LDAP directory or Active Directory.
eDirectory is the proud successor of Novell
NDS, more than 15 years of experience.
eDirectory is a LDAP v3 100% compliant.
eDirectory offers a cross-platform support
(Linux, Windows, Solaris, HP-UX...).
eDirectory is extremely secure and provides
granular rights up to attribute level (ACL).
eDirectory offers you :
◦ Multi-master support
◦ Automatic replication without extra layer (cluster, ...)
(in LAN or WAN environment) – synchronous or
asynchronous
◦ Advanced partitioning support
◦ Filtered replication
◦ Priority/Policy synchronisation (up to attributes level)
◦ Scalability, performance, reliability ( > Mio objects)
◦ Extensibility to your own classes and objects
◦ Advanced tools (iManager, iMonitor, EMBox)
And free to use with many
Novell or NetIQ products !!!
In Identity and Access Manager, it’s the complete
configuration store of your IAM deployment.
In SSO, it is also the safe hosting securely all user
credentials for the applications.credentials for the applications.
In PKI, it can also be your Certificate’s repository.
The information stored in your directory is crucial
and the time to rebuild it can be huge.
A human error can lead to delete a full container
with tons of objects AND cross-references.
An IDM connecter improperly configured can
propagate wrong information or delete
thousands of data in a matter of seconds.thousands of data in a matter of seconds.
Out-of-the-box tools like EMBox or traditional
backup take care of the restore of the complete
replica, container or object but what about a
single attribute ? What about all cross-
references ?
DSGuardian is the new name and the last version of
a successful product used, since years, world wide,
to protect millions of identities and their attributes.
DSGuardian is appropriate to protect the smallestDSGuardian is appropriate to protect the smallest
implementation to the largest (optimized for
millions of ID to backup).
DSGuardian is an affordable, convenient, fast and
easy to use dedicated recovery tool for eDirectory
and AD.
DSGuardian guarantees a true recovery of
your previous still working solution – not just
a basic restore but a full rebuild of all
relationships with others objects (cross-
references).
DSGuardian does not replace/compete with
your global backup solution, it’s a specific
tool offering you a full protection /
troubleshooting /recovery at incomparable
speed.
DSGuardian was developed to take care of the
particularities and the internals of your
directory: eDirectory, Active Directory or both.
For example, DSGuardian facilitates and
integrates the use of EMBox for full treeintegrates the use of EMBox for full tree
recovery.
DSGuardian can also at backup or recovery
time, filter selected objects to facilitate the
build of a lab or test environment.
in the database of your choice
on demand by a few mouse clicks
Strange system behaviour ?
Abnormal unauthorised access ?
Old version of an IDM connector overwrittenOld version of an IDM connector overwritten
by accident ?
The syndrome of “I didn’t change anything,
boss !”...
C38
Slide 20
C38 :
CATHERINED; 27/09/2013
BACK TO DEMOBACK TO DEMOBACK TO DEMOBACK TO DEMO
Full tree recovery
Object level recovery
Attribute level recovery
Schema level recovery
Trustee recoveryTrustee recovery
Offsite DR & Lab recovery
Automatic password reset
Automatic email alerting
...
DSGuardian is affordable, licensed by users
(regardless of the numbers of objects in your
tree).
DSGuardian has a digressive price model based
on volume.on volume.
DSGuardian is proposed with upgrade
protection, standard or priority support.
Special licensing for academic and public
sector.
DSGuardian is to eDirectory (/AD) what
Reload is to Groupwise !
See for yourself by requesting a
free 30 days trial !
Do not forget : be protectedDo not forget : be protected
before something HappenS ...
to your Directory
C45
Slide 28
C45 Make your own opinion
by requesting a free trial version (30days)
Do not forget: be protected 24/7 when something will happen to your Directory
CATHERINED; 27/09/2013
DSDSDSDSGuardianGuardianGuardianGuardian
Directory recovery
at the speed of your business
DSDSDSDSGuardianGuardianGuardianGuardian is the tool that your LDAP Directory deserves !!is the tool that your LDAP Directory deserves !!is the tool that your LDAP Directory deserves !!is the tool that your LDAP Directory deserves !!

Más contenido relacionado

La actualidad más candente

JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...chennaijp
 
SQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi CohnSQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi Cohnsqlserver.co.il
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerBehnam Mohammadi
 
SQL Server Column Based Encryption
SQL Server Column Based EncryptionSQL Server Column Based Encryption
SQL Server Column Based EncryptionDavid Dye
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance EvolvedSafeNet
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeAxel Dittmann
 

La actualidad más candente (18)

JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
 
SQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi CohnSQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi Cohn
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL Server
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
SQL Server Column Based Encryption
SQL Server Column Based EncryptionSQL Server Column Based Encryption
SQL Server Column Based Encryption
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Wso2con identity patterns
Wso2con identity patternsWso2con identity patterns
Wso2con identity patterns
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Data Security in Collaboration
Data Security in CollaborationData Security in Collaboration
Data Security in Collaboration
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edge
 

Destacado

GWAVACon EMEA Keynote2012_vmuir_final
GWAVACon EMEA Keynote2012_vmuir_finalGWAVACon EMEA Keynote2012_vmuir_final
GWAVACon EMEA Keynote2012_vmuir_finalGWAVA
 
GWAVACon 2013: Retain Migration Session
GWAVACon 2013: Retain Migration SessionGWAVACon 2013: Retain Migration Session
GWAVACon 2013: Retain Migration SessionGWAVA
 
Gwava best practices
Gwava   best practicesGwava   best practices
Gwava best practicesGWAVA
 
GWAVACon 2013: Novell Open Enterprise Server Best Practices
GWAVACon 2013: Novell Open Enterprise Server Best PracticesGWAVACon 2013: Novell Open Enterprise Server Best Practices
GWAVACon 2013: Novell Open Enterprise Server Best PracticesGWAVA
 
GWAVACon 2013: Daccord - Control your access
GWAVACon 2013: Daccord - Control your accessGWAVACon 2013: Daccord - Control your access
GWAVACon 2013: Daccord - Control your accessGWAVA
 
GWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworksGWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworksGWAVA
 
車いす走行時の振動を用いた筋活動量計測手法の評価
車いす走行時の振動を用いた筋活動量計測手法の評価車いす走行時の振動を用いた筋活動量計測手法の評価
車いす走行時の振動を用いた筋活動量計測手法の評価Katsuhiro Morishita
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschGWAVA
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunGWAVA
 

Destacado (9)

GWAVACon EMEA Keynote2012_vmuir_final
GWAVACon EMEA Keynote2012_vmuir_finalGWAVACon EMEA Keynote2012_vmuir_final
GWAVACon EMEA Keynote2012_vmuir_final
 
GWAVACon 2013: Retain Migration Session
GWAVACon 2013: Retain Migration SessionGWAVACon 2013: Retain Migration Session
GWAVACon 2013: Retain Migration Session
 
Gwava best practices
Gwava   best practicesGwava   best practices
Gwava best practices
 
GWAVACon 2013: Novell Open Enterprise Server Best Practices
GWAVACon 2013: Novell Open Enterprise Server Best PracticesGWAVACon 2013: Novell Open Enterprise Server Best Practices
GWAVACon 2013: Novell Open Enterprise Server Best Practices
 
GWAVACon 2013: Daccord - Control your access
GWAVACon 2013: Daccord - Control your accessGWAVACon 2013: Daccord - Control your access
GWAVACon 2013: Daccord - Control your access
 
GWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworksGWAVACon 2013: Gain Control - ZENworks
GWAVACon 2013: Gain Control - ZENworks
 
車いす走行時の振動を用いた筋活動量計測手法の評価
車いす走行時の振動を用いた筋活動量計測手法の評価車いす走行時の振動を用いた筋活動量計測手法の評価
車いす走行時の振動を用いた筋活動量計測手法の評価
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
 

Similar a GWAVACon 2013: DSGuardian

Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforcePawel Maczka
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDGaret Keller
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Bartosz Bredy
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeBloombase
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeBloombase
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524sang yoo
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataMirantis
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Cloud Storage
Cloud StorageCloud Storage
Cloud StorageVishalR50
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protectiondoogstone
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsErnest Mueller
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12Patryk Bobak
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 

Similar a GWAVACon 2013: DSGuardian (20)

Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protection
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 

Más de GWAVA

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen GWAVA
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishGWAVA
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrintGWAVA
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GWAVA
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...GWAVA
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationGWAVA
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldGWAVA
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - OverviewGWAVA
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom DevelopmentGWAVA
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWiseGWAVA
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud OfferingGWAVA
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesGWAVA
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationGWAVA
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7GWAVA
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersGWAVA
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainGWAVA
 
Archiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business ValueArchiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business ValueGWAVA
 

Más de GWAVA (20)

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with Retain
 
Archiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business ValueArchiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business Value
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

GWAVACon 2013: DSGuardian

  • 1. DSDSDSDSGuardianGuardianGuardianGuardian Directory recovery at the speed of your business Leverage the power of your directory and protect it with DSGuardian ! Marc Boitel, Ir CEO OPNS
  • 2. Everyone has understood that the future is in the cloud, right ? OK but Cloud under control or not ? Do you want to define and control who may access what in the Cloud ? Do you want to define and control who may access what from the Cloud ?
  • 3. For everything ... You want and need to keep internally your user & privilege management (even if acceded from the cloud by federation).from the cloud by federation). NetIQ for example has the right tools to keep your cloud (private, public or hybrid) under control and safe enough from your side.
  • 4. Amazing story... Are you ready to take risks and expose your company data to anyone on the web ? By accident or deliberately by hackers (knowing that most of them are internal employees) Security is and will remain, regardless of the IT evolution, a major topic.
  • 5. Your directory is your secure repository of your users and all related information (attributes) like among others : ◦ Group membership ◦ Roles◦ Roles ◦ (Cloud) Access rights ◦ ... Fact : Most of the companies rely today on an LDAP directory or Active Directory.
  • 6. eDirectory is the proud successor of Novell NDS, more than 15 years of experience. eDirectory is a LDAP v3 100% compliant. eDirectory offers a cross-platform support (Linux, Windows, Solaris, HP-UX...). eDirectory is extremely secure and provides granular rights up to attribute level (ACL).
  • 7. eDirectory offers you : ◦ Multi-master support ◦ Automatic replication without extra layer (cluster, ...) (in LAN or WAN environment) – synchronous or asynchronous ◦ Advanced partitioning support ◦ Filtered replication ◦ Priority/Policy synchronisation (up to attributes level) ◦ Scalability, performance, reliability ( > Mio objects) ◦ Extensibility to your own classes and objects ◦ Advanced tools (iManager, iMonitor, EMBox) And free to use with many Novell or NetIQ products !!!
  • 8. In Identity and Access Manager, it’s the complete configuration store of your IAM deployment. In SSO, it is also the safe hosting securely all user credentials for the applications.credentials for the applications. In PKI, it can also be your Certificate’s repository. The information stored in your directory is crucial and the time to rebuild it can be huge.
  • 9. A human error can lead to delete a full container with tons of objects AND cross-references. An IDM connecter improperly configured can propagate wrong information or delete thousands of data in a matter of seconds.thousands of data in a matter of seconds. Out-of-the-box tools like EMBox or traditional backup take care of the restore of the complete replica, container or object but what about a single attribute ? What about all cross- references ?
  • 10. DSGuardian is the new name and the last version of a successful product used, since years, world wide, to protect millions of identities and their attributes. DSGuardian is appropriate to protect the smallestDSGuardian is appropriate to protect the smallest implementation to the largest (optimized for millions of ID to backup). DSGuardian is an affordable, convenient, fast and easy to use dedicated recovery tool for eDirectory and AD.
  • 11. DSGuardian guarantees a true recovery of your previous still working solution – not just a basic restore but a full rebuild of all relationships with others objects (cross- references). DSGuardian does not replace/compete with your global backup solution, it’s a specific tool offering you a full protection / troubleshooting /recovery at incomparable speed.
  • 12. DSGuardian was developed to take care of the particularities and the internals of your directory: eDirectory, Active Directory or both. For example, DSGuardian facilitates and integrates the use of EMBox for full treeintegrates the use of EMBox for full tree recovery. DSGuardian can also at backup or recovery time, filter selected objects to facilitate the build of a lab or test environment.
  • 13. in the database of your choice
  • 14. on demand by a few mouse clicks
  • 15.
  • 16. Strange system behaviour ? Abnormal unauthorised access ? Old version of an IDM connector overwrittenOld version of an IDM connector overwritten by accident ? The syndrome of “I didn’t change anything, boss !”...
  • 17.
  • 18.
  • 19.
  • 20. C38
  • 22. BACK TO DEMOBACK TO DEMOBACK TO DEMOBACK TO DEMO
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Full tree recovery Object level recovery Attribute level recovery Schema level recovery Trustee recoveryTrustee recovery Offsite DR & Lab recovery Automatic password reset Automatic email alerting ...
  • 28. DSGuardian is affordable, licensed by users (regardless of the numbers of objects in your tree). DSGuardian has a digressive price model based on volume.on volume. DSGuardian is proposed with upgrade protection, standard or priority support. Special licensing for academic and public sector. DSGuardian is to eDirectory (/AD) what Reload is to Groupwise !
  • 29. See for yourself by requesting a free 30 days trial ! Do not forget : be protectedDo not forget : be protected before something HappenS ... to your Directory C45
  • 30. Slide 28 C45 Make your own opinion by requesting a free trial version (30days) Do not forget: be protected 24/7 when something will happen to your Directory CATHERINED; 27/09/2013
  • 31. DSDSDSDSGuardianGuardianGuardianGuardian Directory recovery at the speed of your business DSDSDSDSGuardianGuardianGuardianGuardian is the tool that your LDAP Directory deserves !!is the tool that your LDAP Directory deserves !!is the tool that your LDAP Directory deserves !!is the tool that your LDAP Directory deserves !!