All resources sponsored by:

FoxT

17 Matches
Privileged Access Management: Why Sudo in Longer Enough
sponsored by FoxT
WHITE PAPER:This white paper presents Sudo's shortcomings for identity and access management of privileged accounts and what you can do to guarantee secure authentication for users. Read on to learn more.
Posted: 06 Jan 2016 | Published: 23 Dec 2015
Get This Now


Utility Protects Servers and Simplifies Compliance with Access Management
sponsored by FoxT
CASE STUDY:Defining, managing, and enforcing authentication automatically across diverse IT platforms and locations is no easy feat. This case study explores how South Western Electric & Power Company enabled effective access control and centralized administration, authentication, authorization, and auditing.
Posted: 06 Jan 2016 | Published: 04 Dec 2015
Get This Now


Taming the Beast- Controlling SSH for Security and Compliance
sponsored by FoxT
WHITE PAPER:Are SSH keys the saviors of identity management and access security for your organizations? With several different styles of keys, it's imperative you know the differences and guidelines to using them. Access this white paper to learn more about SSH keys and taking the next step to centralizing SSH session access control to boost security.
Posted: 05 Jan 2016 | Published: 11 Nov 2015
Get This Now


Puppet: The Good, Bad, and Ugly for Configuration Management & Security
sponsored by FoxT
WHITE PAPER:This white paper talks you through the strengths and vulnerabilities of running Puppet in your organization for IAM and steps to take to improve security. Read on to learn how to scale Puppet with your user base and keep employees secure.
Posted: 05 Jan 2016 | Published: 02 Dec 2015
Get This Now


Best Practices for UNIX/LINUX Priviledged Identity and Access Management
sponsored by FoxT
WHITE PAPER:On Unix/Linux OSs, the all-powerful "root" privilege is the key to your organization facing a serious breach. This white paper explores the importance of limiting access privileges and the vulnerabilities root privileges create. Read on and learn Unix/Linux OS best practices
Posted: 04 Jan 2016 | Published: 23 Dec 2015
Get This Now


OPM Breach: Why Security Needs to be a Priority
sponsored by FoxT
WHITE PAPER:Learn more about the political battle security teams are losing and why root access requirements leave your organization open to an IAM hack in this white paper. Find out how to granularly manage access accounts and control privileges across diverse operating systems.
Posted: 04 Jan 2016 | Published: 23 Dec 2015
Get This Now


Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
sponsored by FoxT
CASE STUDY:This case study examines how one manufacturing company was able to simplify their compliance and administration with network security and access management software. Read on to see how this centralized solution can enable your enterprise to automatically authorize user access, streamline your operations, and closes security gaps.
Posted: 23 Dec 2015 | Published: 23 Dec 2015
Get This Now


INTEGRIS Health Turns to Streamline Linux Server Management and Mitigate System Vulnerabilities
sponsored by FoxT
CASE STUDY:Uncover how INTEGRIS Health, Oklahoma's largest health system of 9,000 employees, accelerated deployment of users and user groups onto their Linux servers and reduces time to give users privileged access.
Posted: 22 Dec 2015 | Published: 16 Dec 2015
Get This Now


Configuration Management: Puppet or Chef?
sponsored by FoxT
WHITE PAPER:This white paper pits Puppet against Chef and brings the shortcomings of each to light to help your organization decide which strategy is right for your IAM needs.
Posted: 22 Dec 2015 | Published: 04 Dec 2015
Get This Now


Global Food and Beverage Provider Centralizes Privileged Access Management
sponsored by FoxT
CASE STUDY:In this white paper, you'll review how one global food and beverage provider automated identity and access management (IAM) processes to rectify a failed SOX audit. Read on to learn if their modified strategy is right for your organization.
Posted: 21 Dec 2015 | Published: 01 Dec 2015
Get This Now


Financial Institution Uses BoKs to Centralize Access Controls Across 50,000 Servers
sponsored by FoxT
CASE STUDY:In this case study, you will learn how to centralize and automate the user account administration across your servers, enabling you to allocate fewer resources to security administration and control access. Access this study to address key regulatory compliance mandates.
Posted: 18 Dec 2015 | Published: 18 Dec 2015
Get This Now


The Essential Guide to Privileged Access Management
sponsored by FoxT
WHITE PAPER:In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015
Get This Now


Specification IAM Server Control
sponsored by FoxT
WHITE PAPER:This white paper teaches you how to enable holistic identity management, strong authentication, granular control, and SSO for users while mitigating unwanted access.
Posted: 17 Dec 2015 | Published: 02 Dec 2015
Get This Now


Presentation Transcript: Securing Access to Resources in the Cloud:  What's Really Possible Today
sponsored by FoxT
PRESENTATION TRANSCRIPT:This presentation transcript explores the cloud from both a business and technical perspective to show how organizations can benefit from cloud services while maintaining the control and auditing capabilities to remain secure.
Posted: 19 May 2010 | Published: 19 May 2010
Get This Now


Top Ten Essentials for Privileged Account Management
sponsored by FoxT
WHITE PAPER:In this white paper, discover how you can effectively and efficiently control privileged accounts using the latest in adaptive access controls management. You will also learn about how to leverage the latest in Role-Based Access Controls.
Posted: 01 Feb 2010 | Published: 01 Feb 2010
Get This Now


Role Based Access Control and Entitlement Management
sponsored by FoxT
PRESENTATION TRANSCRIPT:The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
Posted: 30 Sep 2009 | Published: 30 Sep 2009
Get This Now


Access Control in Virtual Environments
sponsored by FoxT
WHITE PAPER:The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources.
Posted: 16 Jun 2008 | Published: 16 Jun 2008
Get This Now


17 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement