Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:ScriptLogic Corporation

  • The Proactive Migration to Windows 7

    Migrating to Windows 7 will be a complicated process for many organizations. Dealing with hardware and application compatibility issues, establishing a standard desktop environment and keeping users up-to-date and productive is a huge challenge. Explore Windows 7 migration issues in this white paper.

  • Active Administratorâ„¢, Version 5.6.1

    Active Administratorâ„¢ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.

  • Guide: Active Administrator

    Active Directory becomes very complex to manage in Windows networks. Administrators leave, users are given elevated privileges, applications require special accounts - very soon you have an Active Directory full of security weaknesses.

  • Guide: Security Explorer for SharePoint

    With the growing emphasis on regulatory compliance requirements, the need to place strict security measures on the permissions within SharePoint has grown.

  • Guide: Secure Copy

    Getting data moved over to a new server is more than merely copying the most recent files and folders to that machine. File security, permissions, shared folders and local groups facilitating access need to be maintained.

  • Guide: Security Explorer for Exchange

    Financial records, human resource data, customer profiles and more are just a few of the content types that could get in the wrong hands if the appropriate security controls are not in place.

  • Guide: Patch Authority Ultimate

    With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.

  • Guide: File System Auditor

    It sounds simple, but just try to figure out who accessed your confidential data yesterday. IT management standards insist on it, compliance standards require it, but can you deliver?

  • Guide: Enterprise Security Reporter

    In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.

  • Guide: Enterprise Security Reporter for SharePoint

    With more and more sensitive data moving from file servers to SharePoint sites, it's important to keep a close eye on what users can access documents, what users have permissions to change the SharePoint sites, and what documents are getting modified.

  • Guide: Desktop Authority

    Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.

  • Guide: Desktop Authority Password Self-Service

    Desktop Authority® Password Self-Service™ provides an easy-to-use, robust system for allowing users to reset their own forgotten passwords or locked accounts, eliminating the biggest source of help desk calls.

  • Guide: Desktop Authority Image Center

    How many hours/days does it take to get new PC's prepared for a new employee? What happens when 100 new PC's arrive? Is your desktop management plan missing a key ingredient? Let us help.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.