article thumbnail

Application List Report

Mick's IT Blog

They can be filtered out by populating the add/remove programs exclusions file ($ARPExclusionsFile). Here is an example of my ARPExclusions.txt file: 64 Bit HP CIO Components Installer Active Directory Authentication Library for SQL Server Active Directory Authentication Library for SQL Server (x86) Administrative Templates (.admx)

article thumbnail

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

Cloud Musings

The “Insight Partner Views on Cybersecurity” captures the latest news, trends and best practices surrounding cybersecurity by influential bloggers in the Dell Insight Partner program. This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech.

Dell 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fed Tech Roundup January 5

CTOvision

HyTrust's Jason Lackey: 2-Factor Authentication Could Protect Networks from. Foreign interest in Dell's IT services business could spark federal spinofff - Washington Business Journal (blog). Foreign interest in Dell's IT services business could spark federal spinofff - Washington Business Journal (blog). ExecutiveBiz (blog).

article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

Agencies were instructed to immediately patch critical vulnerabilities, review and tightly limit the number of privileged users with access to authorized systems and dramatically accelerate the use of strong authentication, especially for privileged users. For more on these topics, visit Dell's thought leadership site Power More.

Dell 70
article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

A specific example of strong industry cloud security capabilities is Dell SecureWorks. In April 2015, the Info Security Products Guide recognized the company by announcing Dell as the Grand Trophy Winner as well as the winner of 12 additional awards, including one in cloud security for the Dell Cloud Access Manager.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

A specific example of strong industry cloud security capabilities is Dell SecureWorks. In April 2015, the Info Security Products Guide recognized the company by announcing Dell as the Grand Trophy Winner as well as the winner of 12 additional awards, including one in cloud security for the Dell Cloud Access Manager.

article thumbnail

Security requires long haul planning

Cloud Musings

Luckily during Dell Peak Performance in Las Vegas, I had the opportunity to discuss the importance of such a partnership with Bill Evans , senior director of product marketing for Dell’s Identity and Access Management businesses. What is your role at Dell? I work in the product marketing group within Dell Security.