Filtered Index
Filtered by: Security
Technical Solutions Training Webinar, Vol. 41
You are invited to attend this month’s Technical Solutions Training Webinar. In this webinar, learn about recognizing your organization’s vulnerabilities, and Domain Services for Windows install.
Submitted by: GroupLink1 on Thu. 04.25.2013
Filed Under:
Collaboration Cool Solutions, Cool Solutions
Topic: 3rd Party Products, Best Practices, Domain Services for Windows, Installation, Security, Windows
Novell Datasync Server SSL "Beast" vulnerability
There is an SSL vulnerability for certain configurations of web browsers and other applications that use similar encryption methods that expose them to a "man-in-the-middle" security failure.
Submitted by: jamestaylor on Tue. 12.18.2012
Filed Under:
Cool Solutions, Data Synchronizer Cool Solutions
Topic: Security
Product: Data Synchronizer
Survey - Help us Understand your Cloud Needs
GWAVA has brought the cloud to GroupWise and Vibe. Help us understand how you view the cloud working (or not) for you so we can produce services that you can use. Take the short survey here.
Submitted by: GWAVAComm on Wed. 05.02.2012
Filed Under:
GroupWise Cool Solutions, Cool Solutions
Topic: Anti-Spam, Anti-Virus, Archive, Backup/Restore, Cloud, Disaster Recovery, Security
Product: GroupWise, Vibe
NDSRC
Submitted by: aburgemeister on Thu. 03.22.2012
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Backup/Restore, Security
Product: eDirectory, SUSE Linux
AGS 6: ACF2 Collector and Simulator
ACF2 is a difficult system to feature in demos. It is also difficult to model data coming from ACF2. This article will walk you through a simplified ACF2 model simulated on a database, and an AGS 6 collector.
Submitted by: mbluteau on Wed. 03.14.2012
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Identity & Security Management, Security
Product: Compliance Management Platform, Identity Manager, Secure Identity Management
Sentinel 7 Collector for AGS 6
Here is a quick recipe on how to configure a Sentinel Collector for Access Governance 6. This recipe could be adapted to other database applications.
Submitted by: mbluteau on Tue. 03.06.2012
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Access Control, Identity Management, Log Management, Security
Product: Sentinel





0