Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

HPUX

RSS Feed    Add to Google    Add to My Yahoo!
HPUX Reports
 
How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Virtualizing Enterprise SAP Software Deployments
sponsored by SUSE
WHITE PAPER: Because SAP systems are critical to business operations, companies must ensure that they remain consistently available. This white paper explains how you can leverage virtualization to consolidate SAP servers without compromising the reliability of these crucial applications.
Posted: 18 Jun 2012 | Published: 01 Jun 2011

SUSE

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Unix to Linux Migration Tips: Overcome Common Challenges
sponsored by Red Hat & IBM
EGUIDE: Access this expert resource to discover how to overcome common migration challenges, with respect to hardware and availability issues. Also learn how the New York Stock Exchange benefitted from a Unix-to-Linux migration to keep up with demanding business transactions with minimal downtime.
Posted: 20 Jun 2011 | Published: 20 Jun 2011

Red Hat & IBM

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

Dell, Inc. and Intel®

Presentation Transcript: Why Enterprises Can’t Afford to NOT Use UNIX for Business-Critical Systems
sponsored by HP & Intel®
PRESENTATION TRANSCRIPT: Companies that use UNIX for business critical systems find value in its reliability, stability and memory management. Learn how not using UNIX can affect the performance and reliability of your business critical systems.
Posted: 24 Aug 2010 | Published: 23 Aug 2010

HP & Intel®

The Advantages of Virtualized Linux for Business-Critical Applications
sponsored by SUSE
WHITE PAPER: This expert paper explains how migrating from UNIX-based systems to Linux standard-based servers can simplify the virtualization of your critical applications, enabling improved performance, reliability and agility.
Posted: 18 Apr 2013 | Published: 18 Apr 2013

SUSE

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

MegaCryption v6.2
sponsored by Advanced Software Products Group, Inc. (ASPG, Inc.)
TRIAL SOFTWARE: ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux.
Posted: 06 Mar 2009 | Premiered: 06 Mar 2009

Advanced Software Products Group, Inc. (ASPG, Inc.)
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement