Linux-Based SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux-Based Security returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Enterprise Systems Management
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Anti-Spyware
 •   Security Policies
 •   Telephony/ CTI/ VOIP

Related Searches
 •   Framework Linux-Based Security
 •   Function Of Linux-Based Security
 •   Learn About Linux-Based Security
 •   Learning Linux-Based
 •   Linux-Based Security Definition
 •   Linux-Based Security Development
 •   Linux-Based Security Provider
 •   Make Linux-Based
 •   Print Linux-Based Security
 •   Public Linux-Based Security
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

Optimizing IT Service Delivery: The Need for Linux System Management by Red Hat and JBoss

September 2009 - (Free Research)
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software. 
(WHITE PAPER) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Better Approach to Managing File System Data by EMC Corporation

August 2005 - (Free Research)
File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Roaming Workforce With Cloud-Based Security by Sophos, Inc.

December 2013 - (Free Research)
This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Taking Managed Security Services To The Next Level by Webroot

October 2013 - (Free Research)
This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices. 
(WHITE PAPER) READ ABSTRACT |

SC Magazine Security Brief: Server Side Risk by Lumension

April 2014 - (Free Research)
This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks. 
(WHITE PAPER) READ ABSTRACT |

How-to Build High Performance Security for the Software-Defined Data Center by Trend Micro

April 2014 - (Free Research)
Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network. 
(PODCAST) READ ABSTRACT |

Improving Security with GRC Best Practices by TechTarget

April 2014 - (Free Research)
Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices. 
(RESOURCE) READ ABSTRACT |

Retail Cyber Crime by LogRhythm, Inc.

April 2014 - (Free Research)
This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints. 
(WHITE PAPER) READ ABSTRACT |

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014) by Webroot

February 2014 - (Free Research)
These performance results show testing of 8 compteting security software products and breaks down how each perform in relation to a wide variety of criteria. 
(WHITE PAPER) READ ABSTRACT |

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot by Webroot

February 2014 - (Free Research)
This brief case study shows how one organization deployed a standardized single endpoint security solution and saw improved efficiency and performance. 
(CASE STUDY) READ ABSTRACT |

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks by Lumension

December 2013 - (Free Research)
This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs. 
(WHITE PAPER) READ ABSTRACT |

Design Security Policies For #GenMobile by Aruba Networks

April 2014 - (Free Research)
This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy. 
(WHITE PAPER) READ ABSTRACT |

A New Security Approach for Today's Advanced Attacks by FireEye

December 2013 - (Free Research)
This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks. 
(WHITE PAPER) READ ABSTRACT |

New Security Challenges for State and Local Governments by FireEye

December 2013 - (Free Research)
This white paper explores the current threat landscape and why traditional tools fail to detect advanced attacks. 
(WHITE PAPER) READ ABSTRACT |

Cisco: Scaling Application Vulnerability Management Across the Enterprise by IBM

February 2013 - (Free Research)
This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost. 
(WHITE PAPER) READ ABSTRACT |

Security based on trust not fear by Qualys

April 2014 - (Free Research)
This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers. 
(WHITE PAPER) READ ABSTRACT |

Transforming Information Security: Future-Proofing Processes by RSA, The Security Division of EMC

December 2013 - (Free Research)
Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape. 
(WHITE PAPER) READ ABSTRACT |

What Businesses Need to Know About Cyber Security by Lumension

April 2014 - (Free Research)
Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world. 
(WEBCAST) READ ABSTRACT |

Third Party Applications: A Chink in Your Armour by Lumension

April 2014 - (Free Research)
This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management. 
(WEBCAST) READ ABSTRACT |

Cisco 2014 Annual Security Report by Cisco Systems, Inc.

April 2014 - (Free Research)
This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime. 
(WHITE PAPER) READ ABSTRACT |

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus by Lumension

April 2014 - (Free Research)
Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts