ssh

Results 1 - 25 of 27Sort Results By: Published Date | Title | Company Name

Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS

Published By: AWS     Published Date: Oct 01, 2019
Informatica is a leader in Enterprise Cloud Data Management, providing solutions that help organizations optimize, transform, and analyze their data. Informatica’s Intelligent Data Platform is built on a microservices architecture, helping organizations ensure their data is trusted, secure, governed, accessible, timely, relevant, and actionable on-premises or on the cloud.
Tags : 
    
AWS

Stop Unauthorized Privileged Access

Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi

A Deep Dive into Ransomware's Evolution

Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike

The Next Wave of Bot-Driven Brute Force Attacks

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks

A Deep Dive into Ransomware’s Evolution

Published By: CrowdStrike     Published Date: Aug 01, 2017
Learn the inner workings of ransomware and how companies are fighting back. Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs.Download this whitepaper to learn:?The evolution of Ransomware and why businesses can’t afford to ignore it?How perpetrators tactics and targets are evolving to maximize profits?Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
    
CrowdStrike

Implementing A Multi-tiered Cloud Strategy

Published By: Glasshouse Technologies     Published Date: Oct 31, 2012
Implementing a multi-tiered cloud strategy offers flexibility for protection required for workloads and cost-savings of inexpensive cloud services. Learn how to execute a unified, infrastructure to enable organizations to make the best of cloud.
Tags : 
glasshouse, cloud computing, data center, disaster recovery, infrastructure operations, it consulting, business technology, virtualization, infrastructure, infrastructure management
    
Glasshouse Technologies

Oracle Database Cloud Service Quick Start

Published By: Oracle     Published Date: Feb 21, 2018
In this video, you lean how to use your Oracle Database Cloud Service. Find out how to: 1.Create SSH Keys 2. Create a Database Cloud Service Instance 3. Enable Secure Network Access to your Database Instance 4.Access Data with Oracle SQL Developer 5. Monitor Your Database Service Instance with the DBaaS Monitor
Tags : 
    
Oracle

Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling.

Published By: BMC Software     Published Date: Jun 30, 2009
Deploying agent software on every system to run scheduled jobs is expensive, both to install and maintain. In this white paper, independent analyst firm Enterprise Management Associates highlights the cost-savings, flexibility, and agility of the agentless job scheduling technology built in to BMC CONTROL-M.
Tags : 
tco, total cost of ownership, bmc, product suite, wla, agentless, enterprise management associates, ema, windows management instrumentation, wmi, secure shell, ssh, load balancing, enterprise applications
    
BMC Software

SSH Toolkit Designed Specifically for Embedded Devices

Published By: Mocana     Published Date: Jun 22, 2010
Learn how Mocana's NanoSSH can speed your product development while providing best-in-class SSH services custom-built for device environments. Download the NanoSSH whitepaper and receive a free trial.
Tags : 
mocana, nano ssh, embedded device, product development, encryption, database development, system on a chip, embedded systems and networking, integrated circuits and semiconductors
    
Mocana

What Makes OpenVOS OPEN?

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard, ipsec, ntp, openssh, radius, samba, software development, open source
    
Stratus Technologies

Manage Secure Shell (SSH) Access with Time-Bound Certificates

Published By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS

Learn the Benefits of a SaaS-based LDAP

Published By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
    
JumpCloud

A Guide for Easily Managing User Accounts on Your Cloud Servers

Published By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas, active directory
    
JumpCloud

Using Gmail? Still Have Active Directory®? Learn How to Move Your User Directory to the Cloud.

Published By: JumpCloud     Published Date: Sep 29, 2014
Using Gmail? Still have Active Directory? Learn how to move your user directory to the cloud.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, gaps, gads, gmail, sso, configure ldap, knowledge management, productivity, project management, service management
    
JumpCloud

No User Directory? No Problem. Directory-as-a-Service™

Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : 
ldap, active directory, user management, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity management, sso, configure ldap, aws, cloud servers, iaas, user directory, it management, knowledge management, enterprise applications, business technology
    
JumpCloud

Remote Files Sharing by Windows or Samba Over SSH Tunnel

Published By: NuSphere     Published Date: Jul 31, 2008
The problem of providing remote access to the files is nothing new, but the implementation of the solution quite often also determines reliability, safety and productivity. In this article we will look at accessing a remote computer (Unix, Linux or Windows) over non-trusted network.
Tags : 
remote files sharing, samba, ssh tunnel, nusphere, remote access, windows
    
NuSphere

Single Sign-On for Kerberized Linux and UNIX Applications

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos, open ssh, security, internet security, single sign on
    
Likewise Software

Getting the Most Out of Your WirelessHART System

Published By: Phoenix Contact USA     Published Date: Nov 09, 2010
A WirelessHART gateway with WLAN connection means better communication, flexibility and increased efficiency for your HART sensor network.
Tags : 
industrial wireless technology, wirelesshart, wirelesshart gateway, wifi, wireless communications, wireless hardware, wireless infrastructure, wireless security, wlan
    
Phoenix Contact USA

Learn the Benefits of a SaaS-based LDAP

Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
    
JumpCloud

A Guide for Easily Managing User Accounts on Your Cloud Servers

Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas, active directory
    
JumpCloud

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.