Automation Security UnixWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Automation Security Unix returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Operating Systems and Subsystems
 •   Enterprise Systems Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Open Source
 •   Migration Tools and Services
 •   Business Process Automation
 •   Security Policies
 •   Business Intelligence Solutions

Related Searches
 •   Automation Security Events
 •   Automation Security Record
 •   Automation Security Unix Costing
 •   Automation Security Unix Records
 •   On-Line Automation
 •   Print Automation Security
 •   Program Automation Security
 •   Sales Automation
 •   Utility Automation
 •   Wireless Automation Security
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

EXA Corporation Creates a Secure and Resilient Private Cloud by IBM

June 30, 2012 - (Free Research)
In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers. 
(WHITE PAPER) READ ABSTRACT |

Securing Your Valuable SharePoint Data by Dell Software

April 2008 - (Free Research)
Microsoft SharePoint technology is fast becoming a standard for corporate collaboration and document exchange. This paper outlines some of the challenges related to backup and recovery in Windows SharePoint Services 2003, SharePoint Portal Server 2... 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn by Symantec Corporation

December 2010 - (Free Research)
Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Data center automation: realizing rapid value by Hewlett-Packard Company

July 2010 - (Free Research)
Data centre professionals strive to constantly improve operations and performance, yet many infrastructures are highly segregated, making it difficult to streamline processes. This white paper underscores the need for automation and explores the keys steps organisations must take to get started with their automation initiatives. 
(WHITE PAPER) READ ABSTRACT |

Unified Computing: An Agile Platform for Your Next Gen Virtualized Data Center by PC Connection

May 2011 - (Free Research)
The data center is under great pressure as managers try to balance business demands and operational limitations. This webcast discusses how to transform your data center through virtualization and process automation, bringing your organization exceptional benefits. 
(WEBCAST) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console. 
(WHITE PAPER) READ ABSTRACT |

Intel's Vision for the Ongoing Shift to Cloud Computing by Dell, Inc. and Intel®

April 2011 - (Free Research)
Cloud computing promises large gains in efficiency and flexibility at a time when demands on data centers are growing exponentially. Intel’s vision for the future of this technology focuses on key principles to make the vision a reality. View this resource to learn more. 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Compliance Management's Seven Steps to Success by Infoblox

July 2013 - (Free Research)
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance. 
(WHITE PAPER) READ ABSTRACT |

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement by Attachmate Corporation

August 2010 - (Free Research)
Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Case Study: Baltika Breweries Implements Safe File Exchange System by GlobalScape

May 2014 - (Free Research)
This case study follows Baltika Breweries' experience with a comprehensive file transfer platform that could accommodate their growing security requirements. 
(CASE STUDY) READ ABSTRACT |

Make the Move from UNIX to Linux: Now is the Time by HP Novell

January 2011 - (Free Research)
Today’s IT professionals are making strategic investments in Linux, preferring its open architecture and low cost to the proprietary and expensive UNIX platform. Migrating to Linux offers several opportunities for optimizing your data center and controlling costs. Read this white paper to learn more about the many benefits of migrating to Linux. 
(WHITE PAPER) READ ABSTRACT |

Leverage your Oracle 11g skills to learn DB2 9.7 for Linux, UNIX and Windows by IBM

May 2011 - (Free Research)
Learn how your existing professional database knowledge makes it easy for you to learn IBM DB2 9.7 for Linux, UNIX and Windows. 
(WHITE PAPER) READ ABSTRACT |

From Batch Processing to Workload Automation by BMC Software, Inc.

January 2010 - (Free Research)
Download this podcast to find out how IT workload automation can help you improve the efficiency of your overall operations and help your business deliver new applications more quickly. 
(PODCAST) READ ABSTRACT |

AventX Connector for SAP ERP by STR Software

May 2009 - (Free Research)
AventX Connector for SAP ERP works in conjunction with AventX UNIX to automatically fax a limitless number of business documents directly from your SAP application. An economical, easy-to-implement product, the AventX Connector for SAP ERP gives companies the simple tools they need to achieve measurable savings and enhan 
(DATA SHEET) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Linux Made Easy: Migrating From Unix by Red Hat & IBM

November 2010 - (Free Research)
Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux... 
(WHITE PAPER) READ ABSTRACT |

12 Questions to Ask When Choosing an AD Bridge Solution by Dell Software

May 2012 - (Free Research)
This whitepaper details 12 questions you must ask when selecting an active directory solution to ensure you make the right selection. 
(WHITE PAPER) READ ABSTRACT |

System z, x86, UNIX: Which is more secure? by IBM

November 2013 - (Free Research)
Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost. 
(WHITE PAPER) READ ABSTRACT |

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows by IBM

January 2008 - (Free Research)
Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training by Red Hat & IBM

December 2010 - (Free Research)
When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more! 
(EBOOK)

Drive Your Enterprise with Event-Driven Scheduling by Help/Systems

September 2009 - (Free Research)
Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE. 
(WHITE PAPER) READ ABSTRACT |

Real-world Identity and Access Management (IAM) for Unix-based Systems by Dell Software

March 2013 - (Free Research)
Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts