Compliance Security Software UnixWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Security Software Unix returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Operating Systems and Subsystems
 •   Enterprise Systems Management
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Open Source
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Migration Tools and Services
 •   Access Control
 •   Authentication / Password Management

Related Searches
 •   Compliance New Jersey
 •   Compliance Security Software Evaluation
 •   Compliance Security Software New York
 •   Corporation Compliance
 •   Disk Compliance Security
 •   Functions Of Compliance Security
 •   Process Compliance
 •   Purchasing Compliance Security Software
 •   Specialist Compliance
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Don’t Fire Your Firewall by AT&T Corp

January 04, 2011 - (Free Research)
Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software. 
(WEBCAST) READ ABSTRACT |

After Antimalware: Moving Toward Endpoint Antivirus Alternatives by SearchSecurity.com

May 06, 2013 - (Free Research)
This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints. 
(EGUIDE) READ ABSTRACT |

US Foods avoids potential software license penalties with self audit by IBM

April 30, 2013 - (Free Research)
This white paper features an endpoint management system that boosts audit compliance and security through an all-inclusive system. 
(CASE STUDY) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 02, 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

12 Questions to Ask When Choosing an AD Bridge Solution by Dell Software

May 31, 2012 - (Free Research)
This whitepaper details 12 questions you must ask when selecting an active directory solution to ensure you make the right selection. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Real-world Identity and Access Management (IAM) for Unix-based Systems by Dell Software

March 2013 - (Free Research)
Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Root Access Control by BeyondTrust Corporation

May 2009 - (Free Research)
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Active Directory Bridge Solution by Dell Software

February 2011 - (Free Research)
This Quest Software white paper helps you understand the questions to ask when choosing the best Active Directory solution for your company. Don’t waste any more time and money with systems that don’t play well together! Read this Quest white paper today. 
(WHITE PAPER) READ ABSTRACT |

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM) by BeyondTrust Corporation

May 2010 - (Free Research)
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Make the Move from UNIX to Linux: Now is the Time by HP Novell

January 2011 - (Free Research)
Today’s IT professionals are making strategic investments in Linux, preferring its open architecture and low cost to the proprietary and expensive UNIX platform. Migrating to Linux offers several opportunities for optimizing your data center and controlling costs. Read this white paper to learn more about the many benefits of migrating to Linux. 
(WHITE PAPER) READ ABSTRACT |

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

AventX Connector for SAP ERP by STR Software

May 2009 - (Free Research)
AventX Connector for SAP ERP works in conjunction with AventX UNIX to automatically fax a limitless number of business documents directly from your SAP application. An economical, easy-to-implement product, the AventX Connector for SAP ERP gives companies the simple tools they need to achieve measurable savings and enhan 
(DATA SHEET) READ ABSTRACT |

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows by IBM

January 2008 - (Free Research)
Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services by Dell Software

May 2011 - (Free Research)
Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance. 
(WHITE PAPER) READ ABSTRACT |

MegaCryption v6.2 by Advanced Software Products Group, Inc. (ASPG, Inc.)

March 2009 - (Free Research)
ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux. 
(TRIAL SOFTWARE)

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs by IBM

September 2009 - (Free Research)
IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on. 
(WHITE PAPER) READ ABSTRACT |

DataNAS XP by Excel Meridian Data, Inc.

The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses. 
(HARDWARE PRODUCT)

Sunny Days with Cloud Computing by Stoneware, Inc.

July 2008 - (Free Research)
This whitepaper discusses "Cloud Computing" which is a new catch phrase or buzzword for an approach to simplifying an organization's IT environment through the use of virtualization and web technologies. 
(WHITE PAPER) READ ABSTRACT |

Linux Made Easy: Migrating From Unix by Red Hat & IBM

November 2010 - (Free Research)
Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux... 
(WHITE PAPER) READ ABSTRACT |

DB2 for Linux, Unix, and Windows by IBM

April 2012 - (Free Research)
<p>Many organizations are leveraging IBM’s DB2 for its cost and security benefits, as well as its ease of use. This resource introduces its new enhancements that further reduce storage costs and can lead to significant performance improvements. See firsthand what it can offer your organization by downloading this trial.</p> 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts