Linux Based Information Security TargetWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux Based Information Security Target returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Open Source
 •   Virtualization
 •   Endpoint Security
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Security Policies

Related Searches
 •   Buying Linux Based Information
 •   Definitions Linux Based Information
 •   Directory Linux
 •   Financial Linux Based Information
 •   Linux Audit
 •   Linux Based Administration
 •   Linux Based Information Wireless
 •   Reporting Linux Based
 •   Review Linux
 •   Suite Linux Based Information
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 18, 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

ESET File Security for Linux/BSD/Solaris by ESET

August 03, 2010 - (Free Research)
Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by ESET

March 25, 2011 - (Free Research)
ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 10, 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

The CISO's Guide to Virtualization Security by Rapid7

January 12, 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Centrify Express 2010.1 by Centrify Corporation

August 06, 2010 - (Free Research)
Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings. 
(DOWNLOAD)

MegaCryption v6.2 by Advanced Software Products Group, Inc. (ASPG, Inc.)

March 06, 2009 - (Free Research)
ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux. 
(TRIAL SOFTWARE)

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Viridity EnergyCheck - Data Center Energy Resource Management Solution by Viridity Software

September 2010 - (Free Research)
Power issues in your data center? Running out of floor space in your data center? EnergyCenter provides you with the information you need to make your data center more efficient. Stop guessing and start knowing today. 
(TRIAL SOFTWARE)

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

UNIX to Linux Migration Assessment by Red Hat

December 2010 - (Free Research)
Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures. 
(RESOURCE) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

HRG Assessment - Linux Migration by Red Hat & IBM

November 2010 - (Free Research)
The migration from proprietary UNIX and legacy hardware and software-based environments to Linux on x86 Intel architecture (IA) is an effective way to take cost and complexity out of IT. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide to Antimalware by Panda Security

October 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Tightening Down Your Linux Security by Trusted Computer Solutions

April 2010 - (Free Research)
Read this expert presentation transcript to learn about some of the most prevalent security risks to Linux environments today. Gain insight into network devices beyond the server system that need security protection. Discover how to tighten your Linux security and minimize long-term information risks. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Dell Compellent Storage Center - Linux by Dell, Inc.

April 2012 - (Free Research)
This white paper provides an overview of specific information required for administrating storage on Linux servers connected to the Dell Compellent Storage Center. The information is intended for administrators with at minimum a basic understanding of Linux systems, specifically general tasks around managing disk partitions and file systems. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide to Antimalware by AVG Technologies USA, Inc.

November 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

PowerTerm WebConnect - Free 30 Day Trial! by Ericom Software

June 2010 - (Free Research)
PowerTerm WebConnect enhances the flexibility and reliability of Microsoft Terminal Servers, Virtual Desktops and Blade PCs. More flexible, affordable and easier to deploy and extend throughout the organization,  Ericom's centrally administered solution installs and deploys in hours making it an ideal application for mobile workforces. 
(TRIAL SOFTWARE) READ ABSTRACT |

Value Proposition for IBM Power Systems as Database Server in Midsize Companies - Cost Comparisons for Linux by IBM

September 2008 - (Free Research)
This ITG report shows the advantages of the IBM Power platform for Linux database serving in mid-sized companies. It will discuss the use of IBM Power servers for core database serving and give a number of reasons to consider the Power platform. 
(WHITE PAPER) READ ABSTRACT |

Zenoss Core: Open Source Enterprise Monitoring Platform by Zenoss, Inc.

January 2008 - (Free Research)
Zenoss Core provides a single tool to give you comprehensive insight into your entire IT infrastructure including applications, servers, and network. All information and administration is presented via a web application. 
(DEMO) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

April 2013 - (Free Research)
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts