IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed    Add to Google    Add to My Yahoo!
Privileges White Papers (View All Report Types)
 
Configuration Management: Puppet or Chef?
sponsored by FoxT
WHITE PAPER: This white paper pits Puppet against Chef and brings the shortcomings of each to light to help your organization decide which strategy is right for your IAM needs.
Posted: 22 Dec 2015 | Published: 04 Dec 2015

FoxT

Better IAM Means a Better Experience
sponsored by Dashlane Inc.
WHITE PAPER: Could SSO be the key to blocking credential and identity theft? In this white paper, learn about next-gen IAM approaches to mitigate credential theft.
Posted: 25 Nov 2015 | Published: 18 Nov 2015

Dashlane Inc.

Best Practices for UNIX/LINUX Priviledged Identity and Access Management
sponsored by FoxT
WHITE PAPER: On Unix/Linux OSs, the all-powerful "root" privilege is the key to your organization facing a serious breach. This white paper explores the importance of limiting access privileges and the vulnerabilities root privileges create. Read on and learn Unix/Linux OS best practices
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security?
sponsored by CA Technologies.
WHITE PAPER: Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments.
Posted: 15 May 2012 | Published: 15 May 2012

CA Technologies.

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

Infrastructure, Interrupted: Apple in the Enterprise Redefined
sponsored by Acronis
WHITE PAPER: Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization.
Posted: 16 Feb 2012 | Published: 05 Oct 2012

Acronis

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement