This site uses cookies.
Some of these cookies are essential to the operation of the site,
while others help to improve your experience by providing insights into how the site is being used.
For more information, please see the ProZ.com privacy policy.
This person has a SecurePRO™ card. Because this person is not a ProZ.com Plus subscriber, to view his or her SecurePRO™ card you must be a ProZ.com Business member or Plus subscriber.
Affiliations
This person is not affiliated with any business or Blue Board record at ProZ.com.
English to Spanish: Dell Software General field: Tech/Engineering Detailed field: Computers: Software
Source text - English Real-world Identity and Access Management (IAM) for Unix-based Systems
Written by Jason Fehrenbach, senior product manager, Dell
Abstract
Unix systems face special identity and access management (IAM) challenges. This white paper details those challenges and explains how they can be overcome with the right practices and the right tools, enabling you to enhance security, achieve compliance, and dramatically improve operational efficiency.
Introduction
Unix, its rebellious brother Linux, and its hipster cousin Mac OS X, are all foundational technologies at the vast majority of medium-sized and larger organizations. I’ll simply use the term “Unix” from this point on to encompass the full range of Unix- based systems (including Linux and Apple Macintosh). Unix was here before Windows and will be around for the long haul. Due to its stability, cost-effectiveness, and openness, Unix (in all its flavors) continues to grow, and its legion of fans steadfastly hold to its virtues.
But as with any technology, the real-world implications of its adoption present challenges to those organizations that choose to embrace Unix. Twenty-first century realities demand heightened security of technology beyond practices that were common only 20 years ago. Today’s Unix-based organization must account for a more stringent compliance environment, more sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows being at the front of the line.
This white paper discusses the common challenges facing Unix- based organizations and some easily implemented practices
and technologies that can help increase security, achieve compliance, and dramatically improve operational efficiency.
Translation - Spanish Gestión de Acceso e Identidad (GAI) en un entorno real para sistemas basados en Unix
Por Jason Fehrenbach, administrador de productos senior, Dell®
Resumen
Los sistemas Unix enfrentan particulares desafíos en relación a la gestión de acceso e identidad (GAI). Este libro blanco enumera esos desafíos y explica cómo puede superarlos con las prácticas adecuadas y las herramientas correctas, y facilitar una mejora en la seguridad, un alcance del cumplimiento y un notable mejoramiento en la eficiencia operacional.
Introducción
Unix junto a su hermano rebelde, Linux, y a su primo sofisticado, Mac OS X, representan las tecnologías fundacionales en la mayoría de las grandes y medianas empresas. A partir de aquí, usaré el término “Unix” para incluir la gran variedad de sistemas basados en Unix (que abarcan Linux y Apple Macintosh). Unix apareció antes que Windows y seguirá estando. Debido a su estabilidad, rentabilidad y amplitud (en todos sus aspectos) continúa creciendo y su legión de admiradores aprecia sus cualidades.
Pero como cualquier otra tecnología, las implicaciones que aparecen en la práctica presentan desafíos a las empresas que adoptan Unix. Las realidades del siglo XXI demandan una mayor seguridad tecnológica respecto de las prácticas comunes hace 20 años. En la actualidad, la empresa basada en Unix debe justificar un entorno de cumplimiento más riguroso, amenazas más variadas y sofisticadas, y la demanda de interoperabilidad con la gran variedad de sistemas que no pertenecen a Unix- con Microsoft Windows encabezando el listado.
Este libro blanco analiza los desafíos comunes que enfrentan las empresas basadas en Unix y algunas prácticas y tecnologías
fáciles de implementar que pueden ayudar a aumentar la seguridad, alcanzar el cumplimiento y mejorar notablemente la eficiencia operacional.
More
Less
Translation education
Graduate diploma - Saint Bartholomew
Experience
Years of experience: 13. Registered at ProZ.com: Jul 2010.
I was awarded my Translation degree in December 2011 and Interpreting degree in 2012. I have a proficient command of the English language. My areas of interests are education, e-learning, IT and architecture.
I consider myself a dynamic and hard-working person who is keen on working on new projects. Over the past years, I have been working as an English language teacher as well as a freelance translator and I believe I have very good writing and editing skills. In addition, I am fluent in English and I have acquired cultural background by studying, reading and developing my profession as a teacher and as a translator.