Intelligent Linux ComplianceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Intelligent Linux Compliance returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Center Management
 •   Data Security
 •   Enterprise Systems Management
 •   Operating Systems and Subsystems
 •   Open Source
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Identity Management/ User Provisioning

Related Searches
 •   Call Intelligent Linux Compliance
 •   Charts Intelligent Linux
 •   Configuration Intelligent Linux
 •   Flow Intelligent Linux Compliance
 •   Graph Intelligent
 •   Intelligent Linux Compliance Kentucky
 •   Intelligent On-Line
 •   Intelligent Texas
 •   Measure Intelligent Linux Compliance
 •   Procedures Intelligent Linux
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Red Hat and Intel: Moving Intelligence Forward by Red Hat and JBoss

June 01, 2009 - (Free Research)
Put state-of-the-art intelligence to work on the challenges of tomorrow by running Red Hat Enterprise Linux on the latest Intel® Xeon® processors. Red Hat's open source, commercial-strength innovation delivers optimized results for performance, energy efficiency, and advanced virtualization on Intel platforms, all at an affordable price. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Novell and Intel: The Next Chapter of Co-Innovation by Intel

May 04, 2010 - (Free Research)
Read this solution brief to learn how to drive down cost of ownership and speed up return on investment with SUSE Linux Enterprise Server 11 from Novell and the new generation on Intel Xeon processors. 
(PRODUCT OVERVIEW)

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 19, 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Oracle 10gR2 Databases on Hitachi NAS Platform, Powered by BlueArc by Hitachi Data Systems

September 01, 2009 - (Free Research)
The Hitachi NAS Platform, powered by BlueArc, delivers a high-performance, intelligent and scalable multiprotocol solution. This document describes best practices for using Oracle databases on Linux with NAS connectivity provided by the Hitachi NAS Platform through the NFS protocol. 
(WHITE PAPER) READ ABSTRACT |

The Business Value of HP–UX 11i by HP & Intel®

February 16, 2011 - (Free Research)
When HP-UX 11i on Integrity Servers was matched up against Linux on IBM x86 Servers, the results were interesting. Read this paper and find out which lowered TCO and gave higher ROI through superior consolidation, virtualization, scalability, availability, and intelligent manageability. 
(WHITE PAPER) READ ABSTRACT |

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 16, 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 02, 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC

December 17, 2009 - (Free Research)
This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management. 
(WHITE PAPER) READ ABSTRACT |

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

8 Questions You Should Ask About Linux Systems Management by Red Hat and JBoss

July 2009 - (Free Research)
IT organizations are always looking for ways to save money and time without compromising on issues like security or compliance. Exploring the value of your systems management solution is a lot easier when you know the right questions to ask. We have a few suggestions for how to get started. 
(WHITE PAPER) READ ABSTRACT |

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM) by BeyondTrust Corporation

May 2010 - (Free Research)
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Effective Log Management for the IBM Power Systems (i, AIX, Linux) by Safestone Technologies

October 2010 - (Free Research)
This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Role Management for Improved Security and Compliance by IBM

July 2012 - (Free Research)
Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Root Access Control by BeyondTrust Corporation

May 2009 - (Free Research)
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights by SAP America, Inc.

September 2010 - (Free Research)
This Executive Insights paper describes how the combination of EPM and GRC solutions is now more critical than ever for business success. This document also discusses how EPM and GRC must be linked to business intelligence tools and supported by comprehensive services to ensure that the data generated is used appropriately. 
(WHITE PAPER) READ ABSTRACT |

IBM Service Management for the Intelligent Utility Network by IBM

December 2010 - (Free Research)
The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper on eDiscovery & Compliance for Edge data that is in process by CommVault Systems, Inc.

March 2014 - (Free Research)
This informative datasheet gives information on two solutions that can help organizations handle their own compliance and discovery workflows without the help (and expense) of outside consultants. 
(DATA SHEET) READ ABSTRACT |

Symantec Intelligent Data Management by Symantec Corporation

October 2010 - (Free Research)
In this Resource Center learn more about a pre-integrated and validated end-to-end storage and data archiving solution. Symantec's archiving solution running on Dell's fully scalable and easy-to-use object storage offering provides a comprehensive archiving solution designed for compliance, retention and data management needs. 
(RESOURCE CENTER) READ ABSTRACT |

Demystifying IT Risk to Achieve Greater Security and Compliance by Lumension

January 2010 - (Free Research)
Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance. 
(WHITE PAPER) READ ABSTRACT |

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach by Dell Software

August 2011 - (Free Research)
In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity. 
(WHITE PAPER) READ ABSTRACT |

Unified and Intelligent Identity and Access Management by Dell Software

July 2011 - (Free Research)
In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Active Directory Bridge Solution by Dell Software

February 2011 - (Free Research)
This Quest Software white paper helps you understand the questions to ask when choosing the best Active Directory solution for your company. Don’t waste any more time and money with systems that don’t play well together! Read this Quest white paper today. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript by Symantec Corporation

September 2010 - (Free Research)
Check out this presentation transcript to learn about an archiving solution that allows businesses to efficiently manage the increasing costs associated with storage growth, compliance and litigation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z® by IBM

March 2011 - (Free Research)
In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business. 
(WEBCAST)

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts