On-Demand Webinar
The Effects of Cloud Migration on IAM, PAM, and Audit
Tue, 09/18/2018
With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
On-Demand Webinar
Creating Simple Yet Powerful Queries with Sequel
Query-building should be functional and flexible to fit your organization's needs. Sequel helps you build powerful and simple queries for better data access.
Datasheet
Sequel Data Warehouse
Complete integrated suite of tools to build and manage data warehouses and data mart environments.
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Fri, 06/29/2018
The latest Verizon Data Breach Report provides a deeper understanding of the internal threats today's organizations face.
On-Demand Webinar
Moving to Password Level 2 or 3 (and Other Password Tips and Tricks)
Tue, 06/26/2018
Watch this webinar to understand why it’s important to move to a higher password level (QPWDLVL)—and why it's easier than you might think.
On-Demand Webinar
8 Items to Consider When Switching ERPs
By Tim Dunn
This webinar with HarrisData and Fortra covers the eight questions to consider when you switch enterprise resource planning (ERP) systems.
On-Demand Webinar
Business Intelligence is Changing: Make Your Game Plan
Don’t let business intelligence send your head spinning. Watch this webinar to learn how to set your IT department up for BI success in 2018.
Blog
Does Data Analysis Have to Be So Hard?
By Heath Kath on Fri, 05/25/2018
Find out how to get your AS400 or iSeries data and turn it into insight with simple data analysis.
On-Demand Webinar
What Does GDPR Mean for Linux/UNIX and IT Operations?
Tue, 05/22/2018
Find out how GDPR will affect IT Operations on Linux and UNIX.
Sudo Migration Made Simple
Sudo’s “free” open-source access utility can work for managing access to a small number of servers. However, it quickly becomes overwhelming as your business grows and requires more sophisticated fine-grain controls, logging, and compliance-reporting capabilities.
Sudo’s labor-intensive custom configuration and distribution process results in high administrative costs and serious gaps in access...
Blog
What’s the Future of Your Data?
By Mike Stegeman on Fri, 04/06/2018
Find out why it’s important to plan for the future of your data now.
Blog
Shouldn’t Data Access Be Easier?
By Mike Stegeman on Wed, 04/04/2018
You don't have to settle for the same old inefficient data access any longer. There are easier ways to access your data.
Windows SSH Client for Centralized Access Control
Since the end of the “PKI Wars” in the early 2000s, many question the security of Windows desktops environments. This is because it can be difficult to verify whether they’ve been fully locked down.
For Linux/UNIX administrators the tool of choice to log in to systems for remote session administration is PuTTY, a free command line tool, or SuperPuTTY, a Windows edition with scalable windo...
Provisioning Accounts to Multiple Security Domains
Core Privileged Access Manager (BoKS)’s main strength is its ability to create a single security domain of your IT assets, with a single policy set. There are, however, valid reasons to segregate networks, and infrastructure due to:
Differing IT governance, often due to historical M&A activities
The need to report to multiple market regulators or compliance regimes
Public internet-fa...
Pluggable Authentication
Pluggable authentication module (PAM) support in UNIX and Linux operating systems have met, or not met, common standards over the last twenty five years. Vendor-specific wrinkles in meeting PAM specifications have needed coding and operational adjustments. Core Privileged Access Manager (BoKS) hides the platform-specific behavior and operational constraints from centralized security staff for impr...