Research On Unix ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research On Unix Control returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Enterprise Systems Management
 •   Operating Systems and Subsystems
 •   Business Intelligence Solutions
 •   Access Control
 •   Open Source
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Security Policies
 •   Data Security

Related Searches
 •   Case Research On
 •   Issues Research On Unix
 •   Research On Outsourcing
 •   Research On Product
 •   Research On Unix Batch
 •   Research On Unix Improve
 •   Research On Unix Pay
 •   Research On Unix Reports
 •   Research On Work
 •   Researching Research
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

The Total Economic Impact of Migrating from Unix to Red Hat Enterprise Linux by Red Hat

April 29, 2013 - (Free Research)
This video presentation examines the total economic impact of migrating from Unix to Red Hat Enterprise Linux based on research from Forrester. 
(VIDEO) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

IBM Sets Pace in Unix Virtualization by IBM

June 16, 2010 - (Free Research)
This Gabriel Consulting report research report focuses on the survey results and discusses IBM’s Power Systems virtualization milestones and touches on the implications for the Unix server market. 
(WHITE PAPER) READ ABSTRACT |

Make the Move from UNIX to Linux: Now is the Time by HP Novell

January 10, 2011 - (Free Research)
Today’s IT professionals are making strategic investments in Linux, preferring its open architecture and low cost to the proprietary and expensive UNIX platform. Migrating to Linux offers several opportunities for optimizing your data center and controlling costs. Read this white paper to learn more about the many benefits of migrating to Linux. 
(WHITE PAPER) READ ABSTRACT |

12 Questions to Ask When Choosing an AD Bridge Solution by Dell Software

May 31, 2012 - (Free Research)
This whitepaper details 12 questions you must ask when selecting an active directory solution to ensure you make the right selection. 
(WHITE PAPER) READ ABSTRACT |

Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control by CA Technologies.

September 09, 2009 - (Free Research)
Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers. 
(WHITE PAPER) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 16, 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

Closing the Gaps in Root Access Control by BeyondTrust Corporation

May 14, 2009 - (Free Research)
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 16, 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

UNIX to Linux Migration Assessment by Red Hat

December 31, 2010 - (Free Research)
Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures. 
(RESOURCE) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

Real-world Identity and Access Management (IAM) for Unix-based Systems by Dell Software

March 2013 - (Free Research)
Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

DataShare by Excel Meridian Data, Inc.

DataShare is a dual-function server that performs both CD/DVD File Sharing tasks as well as NAS File Data Archiving. It is the first CD/DVD server available in the market that combines these unique features in one easy-to-use solution. 
(HARDWARE PRODUCT)

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

DataNAS XP by Excel Meridian Data, Inc.

The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses. 
(HARDWARE PRODUCT)

HRG Assessment - Linux Migration by Red Hat & IBM

November 2010 - (Free Research)
The migration from proprietary UNIX and legacy hardware and software-based environments to Linux on x86 Intel architecture (IA) is an effective way to take cost and complexity out of IT. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Mission-critical Unix Considerations by HP & Intel®

July 2011 - (Free Research)
Unix remains an important platform for critical enterprise applications. This resource explores the staying power of this venerable operating system and details many of the emerging factors that are affecting its use in the data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

HP-UX 11i v3 Operating Environments - Simplify UNIX operations with the right package by HP & Intel®

February 2011 - (Free Research)
This data sheet provides expert instructions on how to simplify UNIX operations with the HP-UX 11i. 
(DATA SHEET) READ ABSTRACT |

Migrate From Unix To Linux In Six Steps by Red Hat and JBoss

August 2009 - (Free Research)
CIOs are increasingly aware that the Linux® platform offers a low-risk, robust, and value-for-money alternative to traditional UNIX® platforms. This whitepaper will list and describe a simple, six-step process for migrating from UNIX to Linux. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM) by BeyondTrust Corporation

May 2010 - (Free Research)
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line by BeyondTrust Corporation

February 2009 - (Free Research)
Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation. 
(WHITE PAPER) READ ABSTRACT |

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs by IBM

September 2009 - (Free Research)
IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts