Standards  >   Remote Access Protocols  >  

SSH Protocol

RSS Feed    Add to Google    Add to My Yahoo!
SSH ProtocolWhite Papers (View All Report Types)
 
The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today
sponsored by SSH Communications Security Corp.
WHITE PAPER: While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them.
Posted: 21 May 2012 | Published: 21 May 2012

SSH Communications Security Corp.

Fundamental Principles of Network Security
sponsored by APC by Schneider Electric
WHITE PAPER: This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Posted: 10 Jul 2009 | Published: 09 Jul 2009

APC by Schneider Electric

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008

Seros

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Optimizing Microsoft® SharePoint with Dell
sponsored by Dell and Microsoft
WHITE PAPER: The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell and Microsoft

9 Advantages to Using Remote Support Tools for an IT Support Company/Consultant
sponsored by GFI Software
WHITE PAPER: With the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support.
Posted: 22 Dec 2010 | Published: 22 Dec 2010

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement