TITLE

Beyond Trust

AUTHOR(S)
R. S.
PUB. DATE
June 2008
SOURCE
Bank Technology News;Jun2008, Vol. 21 Issue 6, p29
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents a corporate profile of BeyondTrust, which offers enterprises the ability to create flexible application access policies. It notes that the company's flagship product, Privilege Manager, plugs directly into the Window's security infrastructure, Group Policy, and support Windows 2000, XP, Server 2003 and Windows Vista. Dan Blum, senior vice president at the Burton Group, noted that organizations were moving more towards deploying locked down desktops.
ACCESSION #
33313302

 

Related Articles

  • INTEGRATED SYSTEMS.  // Security: Solutions for Enterprise Security Leaders;Feb2001, Vol. 38 Issue 2, p65 

    Reports on the impact of enterprise security issues on the sale of Microsoft Windows 2000, Windows NT and Linux. Comparison of the shipments of Windows 2000 and Windows NT in 2000; Inroads made by Linux; Emphasis of security advances.

  • The writing on the wall.  // Computer Weekly;10/5/2004, p26 

    This article reports that the Sans Institute's critical list of the top 20 security vulnerabilities provides detailed advice on how to secure Windows and Unix systems against the most serious threats on the Internet. The report should, therefore, be required reading for Information Technology...

  • Windows upgrade blocks PC add-ons. Fox, Barry // New Scientist;10/2/2004, Vol. 184 Issue 2467, p26 

    The article focuses on the latest upgrade to Microsoft Corp.'s Windows XP operating system. This deliberately prevents a number of PC add-ons from working. The upgrade, a massive 80-megabyte package called Service Pack 2 (SP2), was already known to cause some equipment to fail, and users had...

  • XP's vital upgrade. Vines, Rose // Australian PC User;Aug2004, Vol. 16 Issue 8, p78 

    Reveals the benefit of upgrading Windows XP computer operating system to Windows XP Service Pack 2 (SP2) from Microsoft Corp. Reason behind the delays in launching SP2; Disk space required to install SP2; Average length of the installation process; Changes in the Windows Firewall feature;...

  • Kernel Patch Protection. Thurrott, Paul // Windows IT Pro;Feb2007, Vol. 13 Issue 2, p10 

    The article provides information on security feature Kernel Patch Protection in Windows Vista. The most often misunderstood fact about Kernel Patch Protection is cited. The common practice with Windows XP prevented by the security feature is tackled. The significance of Kernel Patch Protection...

  • The Feature Behind the Remember my password Check Box. Dizdarevic, Damir // Windows IT Pro;Apr2009, Vol. 15 Issue 4, p27 

    The article examines the Stored User Names and Passwords feature behind the Remember my password check box of Microsoft Windows software operating system (OS). Among the credentials that can be created, managed and used with the feature are usernames, passwords and X.509 certificates for smart...

  • Windows 2003 SECURITY LOG. Smith, Randy Franklin // Windows IT Pro;Mar2005, Vol. 11 Issue 3, p65 

    Presents an overview of the Windows 2003 Security Log. Viewing of the Security log with the Microsoft Management Console Event Viewer snap-in; Security audit categories; Logon and authentication; Account management and directory service access.

  • MICROSOFT'S TIPPING POINT. Nash, Kim S.; Gage, Deborah; Dignan, Larry // Baseline;Mar2004, Issue 28, p22 

    The article discusses the cost of dealing with attacks by hackers on the Windows operating system and related software. Companies have a tough time pinning down what they spend on security. Executives have security budgets for items like firewalls, network monitoring and authentication, but...

  • Are NTFS and Share Permissions Too Complicated? Thomas, Orin // Windows IT Pro;Jul2010, Vol. 16 Issue 7, p78 

    The article discusses the effective implementation of New Technology File System (NTFS) permissions for the Windows operating system. The author mentions the problem resulting from the combination of NTFS permissions and share permissions. It also discusses the different problems which may be...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics