SSH Protocol White Papers

(View All Report Types)
7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

Zero Trust Is Not Enough for Backup
sponsored by Cobalt Iron
WHITE PAPER: Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
Posted: 13 Nov 2024 | Published: 15 Nov 2024

Cobalt Iron

Risk Mitigation, Prevention, and Cutting the Kill Chain
sponsored by Akamai Technologies
WHITE PAPER: Through the implementation of microsegmentation and robust policy controls, Akamai’s approach helps enhance threat detection, accelerate response times, and ensure ongoing business operations, thereby minimizing the potential impact of ransomware attacks.
Posted: 12 Dec 2024 | Published: 12 Dec 2024

TOPICS:  .NET
Akamai Technologies

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

Progress MOVEit Features What Do You Get with Progress MOVEit?
sponsored by Progress Software Corporation MOVEit
PRODUCT OVERVIEW: Your core business processes likely rely on accurate, industry-specific data, data which must be stored securely and compliantly. Progress Software has a fleet of managed file transfer solutions designed to assist any enterprise in transferring their sensitive files. Download this resource to learn more.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

Moveit® Automation Simplify Data Workflows With Powerful Managed File Transfer Orchestration
sponsored by Progress Software Corporation MOVEit
PRODUCT OVERVIEW: Transferring thousands of mission-critical files across your managed servers requires careful consideration for security and compliance measures. But doing so could take weeks and cost an organization a fortune in resources. Read this white paper to learn
Posted: 08 Nov 2024 | Published: 09 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

MOVEit Transfer API API Interface for MOVEit Transfer and MOVEit Cloud
sponsored by Progress Software Corporation MOVEit
PRODUCT OVERVIEW: MOVEit Transfer API lets you simplify administrative tasks by integrating with your favorite business applications, providing extended functionality to Progress® MOVEit® Transfer and Progress® MOVEit® Cloud. In this resource, learn more about how you can move faster and maintain centralized control of your file transfers with MOVEit Transfer API.
Posted: 20 Nov 2024 | Published: 20 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Strata Network Security Buyer’s Guide
sponsored by Palo Alto Networks
EBOOK: In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.
Posted: 31 May 2024 | Published: 01 Jun 2024

TOPICS:  .NET
Palo Alto Networks

Firewall Buyers Guide
sponsored by Palo Alto Networks
BUYER'S GUIDE: As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
Posted: 04 Apr 2024 | Published: 04 Apr 2024

TOPICS:  .NET
Palo Alto Networks

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Zero Trust Lateral Access Control
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure your network by controlling lateral access with zero trust identity. Learn how Zentera's CoIP Platform enables targeted lateral access controls to defend against advanced threats inside your network. Read the solution brief to discover this elegant zero trust approach.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Modernizing Security: Proactive PAM Solutions for Today
sponsored by One Identity
WHITE PAPER: In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  Security
One Identity

Understanding Today’s Threat Actors
sponsored by Fortinet, Inc.
WHITE PAPER: Discover insights on today's threat actors and how they gain access to corporate networks. Learn the most common tactics used to maintain access, conduct discovery, and exfiltrate data. Download the full report for tips on how to improve your security posture.
Posted: 28 Mar 2024 | Published: 28 Mar 2024

TOPICS:  .NET
Fortinet, Inc.

Practical Zero Trust Implementing Protections for High-Value Data
sponsored by Zentera Systems Inc.
EBOOK: This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

LogicVein Thirdeye Suite and Red Hat Ansible Comparison
sponsored by LogicVein
BUYER'S GUIDE: Explore the differences between LogicVein's ThirdEye Suite and Red Hat's Ansible Automation Platform. Both simplify IT tasks through automation but offer distinct approaches: ThirdEye Suite focuses on networks, while Ansible covers broader infrastructure. Read the full buyer's guide to find the best solution for your organization.
Posted: 30 Oct 2024 | Published: 31 Oct 2024

All resources sponsored by LogicVein

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: This Analyst Report provides an overview of the Privileged Access Management (PAM) market, evaluating leading vendors and their solutions. It offers insights into the evolving landscape, focusing on cloud security, identity management, and advanced features. Read the full report to learn how to select the right PAM solution for your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

Unit 42 Attack Surface Threat Report
sponsored by Palo Alto Networks
RESEARCH CONTENT: Explore the latest cybersecurity threats and vulnerabilities in the Unit 42 Attack Surface Threat Report. Uncover critical insights to strengthen your security posture. Read the full report for comprehensive analysis.
Posted: 11 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks

Automate Your Network With Red Hat
sponsored by Red Hat
PRODUCT OVERVIEW: Ready to automate your network? This e-book explains how to get started with Red Hat Ansible Automation Platform, including installing, configuring, and running your first playbook. Learn how to build inventories, implement common use cases, and access certified content to accelerate your network automation journey. Read the e-book to get started.
Posted: 14 Feb 2024 | Published: 26 Nov 2024

Red Hat

UNIT 42 Managed Services Threat Report Summary
sponsored by Palo Alto Networks
RESEARCH CONTENT: The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Posted: 05 Oct 2024 | Published: 05 Oct 2024

Palo Alto Networks

Zero Trust for the Workforce July 2024
sponsored by Cloudflare
ESG RESEARCH REPORT: Cloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, across traditional, digital-native, and public-sector organizations. Download the eBook to see the consensus about Zero Trust for the workforce.
Posted: 19 Jul 2024 | Published: 19 Jul 2024

Cloudflare

Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT: As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024

Cloudflare

2024 PAM Radar Report Keeper Security Vendor Profile
sponsored by Keeper Security Inc
ANALYST REPORT: Keeper Security excels in password management with a robust zero-knowledge security architecture, streamlined deployment, and user-friendly features. The report highlights Keeper's strengths in integration, reporting, and compliance. Read the full analyst report to learn more about Keeper Security's privileged access management capabilities.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

Keeper Security Inc

Obtaining Best-in-Class Network Security with Cloud Ease of Use
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: Secure your cloud workloads with Palo Alto Networks' Cloud NGFW for AWS. This fully managed cloud-native service provides best-in-class network security with easy deployment and zero maintenance. Learn how Cloud NGFW can safeguard your AWS environment.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Palo Alto Networks

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com