Executives (Software) Reports

Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016

TechTarget ComputerWeekly.com

Managing Multiple Operating Systems: Five Best Practices
sponsored by Dell Software
WHITE PAPER: Access this essential resource for best practices for managing multiple operating systems in your enterprise. Learn more about the latest trends in end point management and how to efficiently and securely run your multi-OS environment.
Posted: 31 Jul 2013 | Published: 29 Nov 2012

Dell Software

Presentation transcript: How New Red Hat Solutions Will Change your Business - News From the Red Hat Summit 2012
sponsored by Red Hat
PRESENTATION TRANSCRIPT: Access this presentation transcript for highlights from the exciting Red Hat Summit and JBoss World 2012 events in Boston – and for insight into the topics covered in the 150+ sessions on offer - from cloud strategy and development tools, to cost savings, performance analysis and more.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Red Hat

Your Role in AWS Security
sponsored by TechTarget Search AWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

TechTarget Search AWS

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

Reinventing your IT life-cycle management strategy
sponsored by IBM
WHITE PAPER: View this white paper to learn why converged systems have the potential to radically improve many aspects of the IT life-cycle and how it can add to your business value. It provides many examples on how customers are reinventing their strategies to IT life-cycle management.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

IBM

Which Operating System is Right for your Business Needs?
sponsored by Red Hat
WHITE PAPER: This white paper talks about the challenges of migrating from Solaris 10 to Solaris 11 and highlights the benefits of migrating from Solaris to Red Hat Enterprise Linux instead.
Posted: 09 Apr 2014 | Published: 30 Dec 2011

Red Hat

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Windows 7 Application Migration Checklist
sponsored by Citrix
WHITE PAPER: This resource provides a step-by-stop guide to a successful migration to Windows 7 including hints from your peers who have completed the upgrade. Get a checklist for optimizing your migration plan to avoid potential errors.
Posted: 25 Sep 2012 | Published: 25 Sep 2012

Citrix