Linux-Based SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux-Based Security returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Enterprise Systems Management
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Telephony/ CTI/ VOIP
 •   Change and Configuration Management
 •   Firewalls

Related Searches
 •   Codes Linux-Based
 •   Creating Linux-Based Security
 •   Linux-Based Monitoring
 •   Linux-Based Security Arkansas
 •   Linux-Based Security Budgeting
 •   Linux-Based Security California
 •   Linux-Based Security Claims
 •   Linux-Based Security Price
 •   Linux-Based Security Wireless
 •   On-Line Linux-Based
Advertisement

ALL RESULTS
1 - 25 of 499 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

Optimizing IT Service Delivery: The Need for Linux System Management by Red Hat and JBoss

September 2009 - (Free Research)
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software. 
(WHITE PAPER) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Better Approach to Managing File System Data by EMC Corporation

August 2005 - (Free Research)
File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data. 
(WHITE PAPER) READ ABSTRACT |

The Dynamic Duo: SAM & Security by CDW Corporation

April 2014 - (Free Research)
This whitepaper offers software asset management as a solution that can meet new licensing and security challenges. 
(WHITE PAPER) READ ABSTRACT |

The Intersection of SAM and Security by CDW Corporation

March 2014 - (Free Research)
This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex. 
(WHITE PAPER) READ ABSTRACT |

The hidden costs of self-signed SSL certificates by Symantec Corporation

December 2012 - (Free Research)
This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor. 
(WHITE PAPER) READ ABSTRACT |

NSS Labs - Breach Detection System Product Analysis by Fortinet, Inc.

April 2014 - (Free Research)
This informative whitepaper discusses the effectiveness of one top-tier breach detection platform and how it can improve your security strategy. 
(WHITE PAPER) READ ABSTRACT |

Protection for Every Enterprise: How BlackBerry Security Works by BlackBerry

July 2014 - (Free Research)
This guide explores BlackBerry 10 and their mobile security methods, as well as their criteria for having the most secure mobile operating system. 
(WHITE PAPER) READ ABSTRACT |

Rethink Defense-In-Depth Security Model For BYOD by SearchSecurity.com

July 2013 - (Free Research)
This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised. 
(EGUIDE) READ ABSTRACT |

IT Security Trends 2013: Mobile security concerns tops the list by SearchSecurity.com

November 2013 - (Free Research)
This expert resource takes an in-depth look at the security trends and priorities of 2013, discussing the shift away from old-school defenses and the central role that mobile security has taken in today's strategies. 
(WHITE PAPER) READ ABSTRACT |

Building momentum: Symantec's new approach to security by TechTarget

March 2014 - (Free Research)
Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth. 
(RESOURCE)

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust. 
(EGUIDE) READ ABSTRACT |

Security Leadership Series: Security Strategies for Success by Citrix

May 2014 - (Free Research)
This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

The 10 “must-haves” for secure enterprise mobility by Citrix

February 2013 - (Free Research)
This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Security Primer: Top Tips for Protecting Your System i by Bytware, Inc.

March 2008 - (Free Research)
This E-Guide from TechTarget's Search400.com explores the many components of System i security. 
(WHITE PAPER) READ ABSTRACT |

An Objective Approach to Security by Bytware, Inc.

May 2007 - (Free Research)
i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this... 
(WHITE PAPER) READ ABSTRACT |

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model by FireEye

June 2014 - (Free Research)
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model. 
(WHITE PAPER) READ ABSTRACT |

6 Ways to Enhance Security in AWS by SafeNet, Inc.

February 2014 - (Free Research)
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data. 
(WHITE PAPER) READ ABSTRACT |

Build Your Identity And Access Management Strategy by Symplified

March 2012 - (Free Research)
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 499 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts