Closing the Gaps in Root Access Control
![Cover Image](https://cdn.ttgtmedia.com/bitpipe/covers/1242310765_401_lg.jpg)
This presentation transcript offers advice on how to deal with external and internal security threats, how to meet compliance standards, and several other related topics including:
- UNIX/Linux Root AccessCommodity Controls Are Too Often IncompleteThird Party Tools
Check it out to learn how your enterprise can benefit from the latest information about access control functionality.