Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

Group Policy Objects

RSS Feed    Add to Google    Add to My Yahoo!
Group Policy Objects Reports
 
Technical Guide on Emerging Threats
sponsored by SearchSecurity.com
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

SearchSecurity.com

How to Enable Cloud Deployments with Active Directory
sponsored by Centrify Corporation
EGUIDE: This expert e-guide discusses the improvements to server virtualization and cloud support in Windows Server 2012. Also, learn more about managing access control to data within Active Directory with Windows Rights Management Services.   
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Centrify Corporation

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

Windows Server 2008 R2: Top 10 Changes You'll Actually Care About
sponsored by Dell, Inc.
WEBCAST: Watch this webcast to learn about the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 05 Feb 2010 | Premiered: Feb 5, 2010

Dell, Inc.

The Truth About MPLS Security
sponsored by Certes Networks
WHITE PAPER: If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Certes Networks

Active Directory Disasters and Tools to Prevent Them
sponsored by Dell Software
WHITE PAPER: Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
Posted: 16 May 2014 | Published: 09 Jan 2013

Dell Software

Simplifying and Securing Group Policy Management
sponsored by Dell Software
WHITE PAPER: Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
Posted: 13 Apr 2012 | Published: 31 Dec 2011

Dell Software

Oracle Database 11g Architecture on Windows
sponsored by Oracle Corporation
PRODUCT LITERATURE: Learn how Oracle continues to improve the performance, scalability, and capability of its Windows database server. This paper describes the architecture of the Oracle database on Windows and how it differs from its counterparts on UNIX and Linux.
Posted: 20 Nov 2007 | Published: 01 Jul 2007

Oracle Corporation

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Presentation Transcript: Windows Server 2008 R2 - Top 10 Changes You'll Actually Care About
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript will discuss the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Dell and Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement