Safestone Technologies Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Safestone Technologies

Overview: Safestone delivers critical security information to the business ensuring enhanced audit, control and regulatory compliance. Safestone's solutions effectively collect, report and manage security logs across the IBM PowerSystems network (i, AIX, Linux).

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Safestone Technologies.
Research offered by Safestone Technologies

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems by Safestone Technologies. March 08, 2011 - This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  View E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems research abstract

Effective Log Management for the IBM Power Systems (i, AIX, Linux) by Safestone Technologies. October 27, 2010 - This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization.

  View Effective Log Management for the IBM Power Systems (i, AIX, Linux) research abstract

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies. November 04, 2011 - This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information.

  View Find the Needle in the Haystack – Audit and Compliance Reporting for AIX research abstract

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies. September 01, 2011 - Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements.

  View On Lockdown: HMV/Waterstone’s asserts control over user activity research abstract

RSA SecurID extension for the IBM System i by Safestone Technologies. October 27, 2010 - White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.

  View RSA SecurID extension for the IBM System i research abstract

 Password Self Help – Password Reset for IBM i by Safestone Technologies. June 07, 2011 - Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.

  View  Password Self Help – Password Reset for IBM i research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts