Policies Linux-BasedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policies Linux-Based returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Enterprise Systems Management
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Telephony/ CTI/ VOIP
 •   Change and Configuration Management
 •   Firewalls

Related Searches
 •   Implementation Of Policies Linux-Based
 •   Linux Based Policies Linux-Based
 •   Policies Consultants
 •   Policies Linux-Based Documents
 •   Policies Linux-Based New York
 •   Policies Linux-Based Retail
 •   Policies Protocol
 •   Rfq Policies Linux-Based
 •   Supply Policies Linux-Based
 •   Vendor Policies Linux-Based
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Optimizing IT Service Delivery: The Need for Linux System Management by Red Hat and JBoss

September 03, 2009 - (Free Research)
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software. 
(WHITE PAPER) READ ABSTRACT |

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

A Better Approach to Managing File System Data by EMC Corporation

August 2005 - (Free Research)
File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

How to Create a Mobile Security Policy by SearchSecurity.com

October 2012 - (Free Research)
This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices. 
(EGUIDE) READ ABSTRACT |

Consumerization 101: Defining & Enforcing a Successful BYOD Policy by SearchSecurity.com

January 2013 - (Free Research)
This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft. 
(EGUIDE) READ ABSTRACT |

BYOPC Strategy: Policies and Problem Solving by SearchSecurity.com

December 2012 - (Free Research)
Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike. 
(EGUIDE) READ ABSTRACT |

BYOD: Policy Creation and it's Increasingly Growing Need by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy. 
(EGUIDE) READ ABSTRACT |

BYOD Policies: Key Steps to Ensure Success by SearchSecurity.com

September 2012 - (Free Research)
This expert E-Guide unveils the top risks inherent to BYOD and offers guidance in creating and enforcing a successful BYOD policy to ensure your enterprise remains safe and under control despite the challenges consumer-based devices bring to the workplace. 
(EGUIDE) READ ABSTRACT |

Creating and Enforcing Email Security Policies by SearchSecurity.com

December 2013 - (Free Research)
This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation. 
(EGUIDE) READ ABSTRACT |

BYOD Security Policy Considerations and Best Practices by SearchSecurity.com

November 2012 - (Free Research)
This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control. 
(EGUIDE) READ ABSTRACT |

BYOD Policy Creation Tips from Gartner by SearchSecurity.com

November 2012 - (Free Research)
This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now. 
(EGUIDE) READ ABSTRACT |

BYOD Security Policy, not MDM, at Heart of Smartphone Security by Symantec Corporation

May 2013 - (Free Research)
This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down. 
(EGUIDE) READ ABSTRACT |

eBook-- Defining an Email-Archiving Policy by Symantec Corporation

July 2009 - (Free Research)
Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages. 
(EBOOK) READ ABSTRACT |

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data. by IBM

February 2013 - (Free Research)
This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

10 Steps to Establishing an Effective Email Retention Policy by CA Technologies.

January 2009 - (Free Research)
Building a well-planned, enterprise-wide email retention policy helps establish uniform and consistent rules for all email and electronic records. 
(WHITE PAPER) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Picking a Sensible Mobile Password Policy by Perimeter eSecurity

November 2011 - (Free Research)
This paper recommends a passcode policy for mobile devices that is reasonable, user-friendly, highly usable, but still strong enough to protect your company’s data. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2008 "Starter" GPOs by Global Knowledge

December 2008 - (Free Research)
An old Chinese proverb advises us to "preserve the old, but know the new." Microsoft's old template concept has been preserved in the Windows Server 2008 operating system, in the form of what Microsoft calls the starter GPO (Group Policy Object). 
(WHITE PAPER) READ ABSTRACT |

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Simplifying and Securing Group Policy Management by Dell Software

December 2011 - (Free Research)
Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices. 
(WHITE PAPER) READ ABSTRACT |

Policy Reference Guide: Blackberry Enterprise Server by BlackBerry

December 2008 - (Free Research)
Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts