Security Checkpoint UnixWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Checkpoint Unix returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Data Center Management
 •   Enterprise Systems Management
 •   Migration Tools and Services
 •   Access Control
 •   Data Security
 •   Open Source
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Authentication / Password Management
 •   Application Management and Maintenance

Related Searches
 •   National Security Checkpoint
 •   Rfp Security Checkpoint
 •   Security Checkpoint Rfp
 •   Security Checkpoint Unix Pay
 •   Security Checkpoint Unix Repairs
 •   Security Operating
 •   Security Paper
 •   Security Portals
 •   Security Process
 •   Spreadsheet Security Checkpoint
Advertisement

ALL RESULTS
1 - 25 of 495 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Realizing Business Value in Managed File Transfer by GlobalScape

April 2008 - (Free Research)
Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data. 
(WHITE PAPER) READ ABSTRACT |

Make the Move from UNIX to Linux: Now is the Time by HP Novell

January 2011 - (Free Research)
Today’s IT professionals are making strategic investments in Linux, preferring its open architecture and low cost to the proprietary and expensive UNIX platform. Migrating to Linux offers several opportunities for optimizing your data center and controlling costs. Read this white paper to learn more about the many benefits of migrating to Linux. 
(WHITE PAPER) READ ABSTRACT |

Why HTML5 Tests the Limits of Automated Testing Solutions by SmartBear Software

August 2012 - (Free Research)
Read this white paper to find suggestion and strategies on how to make HTML5 testing less of a headache. Find resources such as: Clues as to what makes HTML5 testing so hard; Checkpoints for a scalable testing strategy Videos; and Q&A, blogs, and webcasts designed to assist you with your testing project. 
(WHITE PAPER) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Linux Made Easy: Migrating From Unix by Red Hat & IBM

November 2010 - (Free Research)
Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux... 
(WHITE PAPER) READ ABSTRACT |

System z, x86, UNIX: Which is more secure? by IBM

November 2013 - (Free Research)
Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost. 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows by IBM

January 2008 - (Free Research)
Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training by Red Hat & IBM

December 2010 - (Free Research)
When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more! 
(EBOOK)

Real-world Identity and Access Management (IAM) for Unix-based Systems by Dell Software

March 2013 - (Free Research)
Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

Windows 7 Application Migration Checklist by Citrix

September 2012 - (Free Research)
This resource provides a step-by-stop guide to a successful migration to Windows 7 including hints from your peers who have completed the upgrade. Get a checklist for optimizing your migration plan to avoid potential errors. 
(WHITE PAPER) READ ABSTRACT |

Dell Deployment Design and Implementation by Dell, Inc. and Microsoft Windows 7

October 2009 - (Free Research)
The Dell Project and Program Management approach enables the alignment of all elements of a client deployment. This standardized and easy-to-understand framework can be tailored as necessary to complement and integrate with existing customer processes. 
(DATA SHEET) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Expert Strategies for Making a Unix-to-Linux Business Case by SearchDataCenter.com

October 2012 - (Free Research)
Access this expert e-guide and discover how to make the business case for your Unix-to-Linux migration. Learn how to clearly outline Unix limitations and what benefits will be achieved with Linux. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services by Dell, Inc. and Intel®

January 2010 - (Free Research)
In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Mission-critical Unix Considerations by HP & Intel®

July 2011 - (Free Research)
Unix remains an important platform for critical enterprise applications. This resource explores the staying power of this venerable operating system and details many of the emerging factors that are affecting its use in the data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

HP-UX 11i v3 Operating Environments - Simplify UNIX operations with the right package by HP & Intel®

February 2011 - (Free Research)
This data sheet provides expert instructions on how to simplify UNIX operations with the HP-UX 11i. 
(DATA SHEET) READ ABSTRACT |

Migrate From Unix To Linux In Six Steps by Red Hat and JBoss

August 2009 - (Free Research)
CIOs are increasingly aware that the Linux® platform offers a low-risk, robust, and value-for-money alternative to traditional UNIX® platforms. This whitepaper will list and describe a simple, six-step process for migrating from UNIX to Linux. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Migrating from Unix to Red Hat Enterprise Linux by Red Hat

April 2013 - (Free Research)
This video presentation examines the total economic impact of migrating from Unix to Red Hat Enterprise Linux based on research from Forrester. 
(VIDEO) READ ABSTRACT |

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs by IBM

September 2009 - (Free Research)
IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on. 
(WHITE PAPER) READ ABSTRACT |

Expert Advice for Making the Move From Unix to Linux by Red Hat and HP

February 2011 - (Free Research)
Once you know how to make a business case for migration, learn how to train your Unix staff to manage Linux environments. Find out about key differences between the two operating systems and provide your team with tactics for optimal backup and performance monitoring. 
(EGUIDE) READ ABSTRACT |

MegaCryption v6.2 by Advanced Software Products Group, Inc. (ASPG, Inc.)

March 2009 - (Free Research)
ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux. 
(TRIAL SOFTWARE)

1 - 25 of 495 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts