Linux Based Based SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux Based Based Security returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Backup Systems and Services
 •   Data Replication and Mirroring
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security
 •   Virtualization
 •   Enterprise Systems Management
 •   Tape Drives and Libraries
 •   Data Center Management

Related Searches
 •   Diagram Linux Based Based
 •   Imports Linux Based Based
 •   Industries Linux Based
 •   Linux Based Based Financial
 •   Linux Based Code
 •   Linux Based Oregon
 •   Linux Billing
 •   Linux Intranet
 •   Make Linux
 •   Web Linux Based Based
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Value Proposition for IBM Power Systems as Database Server in Midsize Companies - Cost Comparisons for Linux by IBM

September 2008 - (Free Research)
This ITG report shows the advantages of the IBM Power platform for Linux database serving in mid-sized companies. It will discuss the use of IBM Power servers for core database serving and give a number of reasons to consider the Power platform. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Migrating from Unix to Red Hat Enterprise Linux by Red Hat

April 2013 - (Free Research)
This video presentation examines the total economic impact of migrating from Unix to Red Hat Enterprise Linux based on research from Forrester. 
(VIDEO) READ ABSTRACT |

Successful Mobile Deployments Require Robust Security by BlackBerry

May 2009 - (Free Research)
Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection. 
(WHITE PAPER) READ ABSTRACT |

Successful Mobile Deployments Require Robust Security by Lopez Research

May 2009 - (Free Research)
Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Optimizing IT Service Delivery: The Need for Linux System Management by Red Hat and JBoss

September 2009 - (Free Research)
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

ESG Brief: Nexsan and FalconStor Team for High Performance, Operationally Efficient Disk-based Backup by FalconStor Software

August 2009 - (Free Research)
Disk-based backup, deduplication, and MAID are three of the most talked about technologies in the storage industry—each is so popular that organizations often purchase them individually just to see the capabilities they can bring to their environments. Now, all three are available in Nexsan's DeDupe SG. 
(ANALYST REPORT) READ ABSTRACT |

Business Continuity with ReadyNAS by NETGEAR Inc.

November 2010 - (Free Research)
ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage through multi-protocol NAS and SAN support in an affordable storage appliance. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript - Maximizing Enterprise Backup and Dedupe Performance for Greater ROI by FalconStor Software

January 2010 - (Free Research)
Let’s take a look at disk and how it is fundamentally changing data protection. This presentation transcript explains how to leverage the advantages of disk for best possible backup performance and maximum ROI. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Deduping & Backup: A best practice guide – Part 1 by FalconStor Software

May 2011 - (Free Research)
In part one of this data deduplication technology tutorial, we look at all of those alternatives and take a look at some of the most significant deduplication backup products. Learn about global data deduplication, what to look for in a data deduplication product, inline vs. post-processing deduplication, and more. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: High-Speed, Power-Efficient Deduplication: Saving Costs Without Sacrificing Performance by FalconStor Software

September 2009 - (Free Research)
Nexsan and FalconStor have formed a strategic venture to deliver an integrated system designed to optimize almost any backup environment and deliver immediate ROI. Read this presentation transcript to find out how you can minimize reliance on tape, reduce storage consumption and improve operational efficiency. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Building a Better Data Backup Plan: This year's hottest backup trends by NETGEAR Inc.

August 2011 - (Free Research)
To help you build the best backup plan for the new year, read this special report by features writer Carol Sliwa on the hottest backup trends. Learn about what's new in backup software, backup hardware and backup outsourcing. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

5 Steps to Secure the Wireless Network by NETGEAR Inc.

October 2010 - (Free Research)
Today’s organizations increasingly rely on the ease and lower cost of wireless networking. Schools and businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense. Read this white paper to learn how to incorporate wireless connectivity into your everyday. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Data Deduping & Backup: A best practice guide – Part 2 by FalconStor Software

May 2011 - (Free Research)
In part two of this data deduplication technology tutorial, we look at all of those alternatives and take a look at some of the most significant deduplication backup products. Learn about global data deduplication, what to look for in a data deduplication product, inline vs. post-processing deduplication, and more. 
(EGUIDE) READ ABSTRACT |

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP by FalconStor Software

July 2010 - (Free Research)
Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage. 
(PRODUCT DEMO) READ ABSTRACT |

Adventist Health System Uses FalconStor® VTL with Deduplication by FalconStor Software

December 2011 - (Free Research)
This one-page case study explores how one vendor's DR solution helped an organization reduce their backup window by more than 50%, shrink their duplicate data with an average deduplication ratio of 7:1 and maximize their efficiency through reporting and capacity planning capabilities. 
(CASE STUDY) READ ABSTRACT |

Solution Brief: FalconStor Solutions for VMware vCenter Site Recovery Manager by FalconStor Software

June 2011 - (Free Research)
When it comes to disaster recovery, the biggest challenge is to bring systems back online as quickly as possible. In the event of a primary site failure, restoring business operations from a remote site can be a lengthy, complex, and costly manual process. Read this white paper to learn an easier way. 
(IT BRIEFING) READ ABSTRACT |

FalconStor Heats up VTL Deduplication and the Data Deduplication War by FalconStor Software

June 2009 - (Free Research)
Today, let's focus on one of the leading players in the data deduplication space, FalconStor. FalconStor can rightfully claim the market share leadership space for VTLs, even though there are other strong players in the space. But the market is fiercely competitive and FalconStor is not resting upon its laurels. 
(JOURNAL ARTICLE) READ ABSTRACT |

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

Virtually Effortless Backup for VMware Environments by FalconStor Software

March 2009 - (Free Research)
VMware Consolidated Backup (VCB) improves virtual server backup, but there are a number of limitations. FalconStor Software has a solution that works with VCB while overcoming these limitations. Using this solution, you can quickly and efficiently back up virtual machines and retain transactional consistency, without management complexity. 
(WHITE PAPER) READ ABSTRACT |

KVM Security in the Cloud: A Choice That Matters by Global Knowledge

May 2013 - (Free Research)
The resource overviews KVM security and its use in virtualized, multi-tenant cloud scenarios. Examine how open source virtualization leverages SE Linux and its tight integration with Linux kernel to provide a secure computing environment for both end-users and service providers. 
(WHITE PAPER) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Red Hat Enterprise Virtualization For Servers: Overview by Red Hat and JBoss

November 2010 - (Free Research)
Red Hat Enterprise Virtualization features a unique and revolutionary virtualization technology called KVM (Kernelbased Virtual Machine) that converts the Red Hat Enterprise Linux kernel into a virtualization platform. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts