Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

GPO

RSS Feed    Add to Google    Add to My Yahoo!
GPOReports
 
Oracle Database 11g Architecture on Windows
sponsored by Oracle Corporation
PRODUCT LITERATURE: Learn how Oracle continues to improve the performance, scalability, and capability of its Windows database server. This paper describes the architecture of the Oracle database on Windows and how it differs from its counterparts on UNIX and Linux.
Posted: 20 Nov 2007 | Published: 01 Jul 2007

Oracle Corporation

What’s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: In this presentation transcript, IT author Jonathan Hassell walks you through some of the key changes made to R2 in three key areas: Active Directory, Group Policy and Terminal Services.
Posted: 22 Jun 2011 | Published: 21 Jun 2011

Dell and Microsoft

What’s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: In this presentation transcript, IT author Jonathan Hassell walks you through some of the key changes made to R2 in three key areas: Active Directory, Group Policy and Terminal Services.
Posted: 17 Dec 2009 | Published: 17 Dec 2009

Dell and Microsoft

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation

Active Directory Expert Best Practices and Security Tips
sponsored by Centrify Corporation
EGUIDE: Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Centrify Corporation

Ensuring High Availability for Active Directory
sponsored by Dell Software
WHITE PAPER: Every Active Directory administrator will agree that the health stability and recoverability of Active Directory is essential for the enterprise. If Active Directory fails, even in the slightest manner, one or all of the services and communications with Active Directory can also fail. Read this white paper to learn more.
Posted: 15 Sep 2010 | Published: 15 Sep 2010

Dell Software

Active Directory Disasters and Tools to Prevent Them
sponsored by Dell Software
WHITE PAPER: Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
Posted: 16 May 2014 | Published: 09 Jan 2013

Dell Software

The Truth About MPLS Security
sponsored by Certes Networks
WHITE PAPER: If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Certes Networks

Using Classification to Manage Email Policy for the Enterprise
sponsored by TITUS
WHITE PAPER: Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.
Posted: 09 Nov 2007 | Published: 01 Jan 2006

TITUS

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
GPO White Papers | GPO Multimedia | GPO IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement