Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Xenix

RSS Feed    Add to Google    Add to My Yahoo!
Xenix Reports
 
How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

Dell, Inc. and Intel®

The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control
sponsored by CA Technologies.
WHITE PAPER: Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers.
Posted: 02 Mar 2010 | Published: 09 Sep 2009

CA Technologies.

Mainframe Performance Management: A New Twist
sponsored by CA Technologies.
WHITE PAPER: Read this white paper featuring mainframe expert Wayne Kernochan to gain insight on insight on performance management software - specifically as it relates to the mainframe - and on why this technology is more important now than ever before.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

CA Technologies.

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

Migrate From Unix To Linux In Six Steps
sponsored by Red Hat and JBoss
WHITE PAPER: CIOs are increasingly aware that the Linux® platform offers a low-risk, robust, and value-for-money alternative to traditional UNIX® platforms. This whitepaper will list and describe a simple, six-step process for migrating from UNIX to Linux.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and JBoss

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Skill building takes time. Let knowledge paths pave the way.
sponsored by IBM
RESOURCE CENTER: Check out this resource center to find how-to articles, free trial software, discussion forums, educational videos and podcasts, and hands-on exercises to help develop your skills in technologies and products such as: cloud computing, Java, Linux, open source, Web development, XML, AIX and UNIX, business analytics, information management, and more.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement