ABOUT FOXT

Library

The FoxT Library is a central repository of brochures, white papers and case studies. If you want additional information or have a suggestion for a white paper topic, please contact us.

Brochures

FoxT ApplicationControl

FoxT ServerControl

FoxT Enterprise Access Management

FoxT DesktopControl

Case Studies

FoxT Case Study - Financial

FoxT Case Study - Hospital

FoxT Case Study - Manufacturing

FoxT Case Study - Telecommunications

FoxT Case Study - Telecom Italia Brazil

FoxT Case Study - Utilities

SANS WhatWorks Case Study on FoxT ServerControl

FoxT Case Study Pack

Datasheets

FoxT Password Manager

FoxT Reporting Manager

FoxT Web Services Interface

FoxT Compliance Report Packs

FoxT/McAffee - Access Management for Servers, Applications and Databases

FoxT/Oracle - FoxT ServerControl Validated Integration with Oracle Identity Management 9.1

FoxT NERC Report Pack

FoxT HIPAA Report Pack

FoxT SOX Report Pack

FoxT SSH Manager

White Papers

A Practical Approach to Controlling Privileged Accounts

Controlling Access To Business Applications

FoxT Extensible RBAC - OS-Level Separation of Privileges

Proactively Controlling Access to Critical Windows Servers and Simplifying Audits with FoxT ServerControl

Proactively Controlling Access to Patient Data

Role-Based Access Control (RBAC)

The New Gold Standard for Privileged Account Management

Top Ten Essentials for Privileged Account Management

Technology Guide: Essentials for Privileged Access Management

Privileged Account Access Management: Why Sudo Is No Longer Enough

Kill Five Birds with One Stone: Satisfying Multiple Regulations with Centralized Access Control Enforcement and Compliance Reporting

CISO Briefing: How Security Can Enable Top IT Priorities for 2013

Securing Access to the IT Infrastructure: What Every CISO Needs to Know

Centralize Local Privileged Account Access Enforcement and Audits for Windows Servers

Centrally Managed SSH

CISO Report: Seven Security Vulnerabilities

The Native Windows Server Security Blind Spot

What Organizations are Missing in the Fight Against Cyber Crime

Password Vaulting and Session Monitoring Versus Enforceable Privileged Access Management

2013 Definitive Guide to Identity Access Governance and Access Enforcement

The 5 'Must Have' Capabilities for Privileged Access Management

Native Windows Server: The Security Gaps

CISO Report: Rethinking Your Access Management & Governance Strategy

Analyst and Third Party Reports

Adding Enterprise Access Management to Identity Management (SANS White Paper)

WhatWorks in Controlling Privileged User Access to Systems (SANS Case Study)

Technology Overview for Privileged Account Management (Gartner Report)

On Demand Videos, Webcasts and Podcasts

FoxT ServerControl Overview Demo

FoxT ServerControl – Full Presentation and Demo

FoxT ServerControl: Controlling Privileged Accounts

FoxT ApplicationControl: Securing Business Applications

FoxT DesktopControl Overview Demo

FoxT Reporting Manager Overview Demo

FoxT AD Bridge Overview Demo

Ask The Expert Webcast: Securing Access to the IT Infrastructure: Predictions for 2012 that Every IT Security Pro Needs to Know FoxT/McAfee ePolicy Orchestrator (ePO) Integration Demo

FoxT Peer Talks – Applied Materials on What Works and What Doesn't for Privileged Access Management

FoxT Peer Talks – ING's Approach to Privileged Access Management Webinar

Privileged Access Management: Echelon One Study Results Webinar

Privileged Access Management: Preparing for 2013

What's New in FoxT ServerControl 6.7

 Warning

Javascript is currently disabled. For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser .

 Warning

You are using an outdated browser. Sorry, this web site doesn't support Internet Explorer 6. To get the best possible experience using our website we recommend that you upgrade to a newer version or other web browser. A list of the most popular web browsers can be found below. It is completely free for download: