Closing the Gaps in Root Access Control
This presentation transcript offers advice on how to deal with external and internal security threats, how to meet compliance standards, and several other related topics including:
- UNIX/Linux Root AccessCommodity Controls Are Too Often IncompleteThird Party Tools
Check it out to learn how your enterprise can benefit from the latest information about access control functionality.