Berkeley UNIX Reports

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

Dell, Inc. and Intel®

Presentation Transcript: New economies of Unix mission critical computing
sponsored by HP & Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript learn why moving to Unix can help address concerns of uptime, flexibility and improved service levels when managing mission critical systems.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

HP & Intel®

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs
sponsored by IBM
WHITE PAPER: IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on.
Posted: 15 Jun 2010 | Published: 21 Sep 2009

IBM

Migrating from UNIX*/RISC* to Red Hat Enterprise Linux®on Intel® processor-based Servers
sponsored by Red Hat - HPE
WHITE PAPER: This white paper provides high-level guidelines for assessing cost and complexity of a Linux migration and provides tips for planning a smooth, successful and strategic transition. Discover how your organization can add value to its IT infrastructure with the use of open source software.
Posted: 18 Jul 2012 | Published: 31 Dec 2009

Red Hat - HPE

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance.
Posted: 24 May 2011 | Published: 23 May 2011

Dell Software

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM