All resources sponsored by:

BeyondTrust Corporation

11 Matches
How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER:Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009
Get This Now


Least Privilege Application Compatibility for Windows 7 Migrations
sponsored by BeyondTrust Corporation
WHITE PAPER:This whitepaper will give you an overview of the new technology built into Windows 7 operating systems, and how this technology can help your enterprises complete your migration. We will also surface some of the confusion around what those technologies mean from a security perspective.
Posted: 23 Jun 2010 | Published: 23 Jun 2010
Get This Now


Securing Privilege Delegation in Public and Private Cloud Computing Infrastructure
sponsored by BeyondTrust Corporation
WHITE PAPER:As an emerging trend that provides rapid access to dynamically scalable and virtualized IT resources, cloud computing promises new and exciting opportunities for organizations to create lean, robust and cost-effective IT infrastructures that better align with business goals. Read this paper to find out more.
Posted: 11 Jun 2010 | Published: 10 Jun 2010
Get This Now


How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER:This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010
Get This Now


BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER:This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010
Get This Now


Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER:This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010
Get This Now


A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER:This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009
Get This Now


Preventing Data Breaches in Privileged Accounts Using Access Control
sponsored by BeyondTrust Corporation
WHITE PAPER:This white paper explores insider attacks, threats and risks involved across every enterprise. Also, we will recommend a sound, cost-saving solution to prevent a disaster from happening to a company's financial assets and reputation using access control.
Posted: 21 Aug 2009 | Published: 21 Aug 2009
Get This Now


Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT:Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009
Get This Now


PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER:Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009
Get This Now


Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE:This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009
Get This Now


11 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement