Statements (87)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Ne_XTSTEP_4.7
|
gptkbp:based_on |
gptkb:Mach_Kernel
|
gptkbp:developed_by |
gptkb:Ne_XT,_Inc.
|
gptkbp:features |
gptkb:Secure_Sockets_Layer_(SSL)
Audit Trails User Roles File Permissions |
https://www.w3.org/2000/01/rdf-schema#label |
Ne XTSTEP Security System
|
gptkbp:is_available_on |
gptkb:Ne_XT_Computers
|
gptkbp:is_compatible_with |
gptkb:tower
Legacy Systems Cross-platform Applications |
gptkbp:is_designed_for |
Developers and Administrators
|
gptkbp:is_documented_in |
gptkb:Ne_XTSTEP_Documentation
Security Protocols Online Resources Technical Manuals Technical Specifications User Guides |
gptkbp:is_evaluated_by |
Security Standards
Security Auditors |
gptkbp:is_implemented_in |
gptkb:C_Programming_Language
|
gptkbp:is_influenced_by |
Unix Security Models
|
gptkbp:is_integrated_with |
gptkb:software
Compliance Tools Identity Management Systems Third-party Tools Network Security Tools |
gptkbp:is_known_for |
gptkb:Reliability
Scalability Ease of Use User-friendly Interface Robust Security Features |
gptkbp:is_part_of |
gptkb:Ne_XTSTEP_Development_Environment
gptkb:Ne_XTSTEP_Operating_System gptkb:Ne_XTSTEP_Software_Suite gptkb:Ne_XTSTEP_Frameworks gptkb:Ne_XT_Computer_Systems Ne XTSTEP User Environment Ne XTSTEP Security Architecture Ne XTSTEP Security Solutions |
gptkbp:is_recognized_by |
Industry Experts
Tech Analysts Security Organizations |
gptkbp:is_recognized_for |
gptkb:benchmark
Innovative Design User Satisfaction |
gptkbp:is_related_to |
Object-oriented Programming
|
gptkbp:is_supported_by |
gptkb:Research_Institute
User Feedback Community Forums User Communities Documentation Resources |
gptkbp:is_tested_for |
Compliance Requirements
Security Vulnerabilities Quality Assurance Teams Security Audits Security Frameworks Penetration Testing Teams |
gptkbp:is_used_for |
gptkb:software
|
gptkbp:is_used_in |
gptkb:software_framework
|
gptkbp:is_utilized_in |
gptkb:software
gptkb:Educational_Institution Government Agencies Incident Response Research Institutions System Security Compliance Audits Corporate Environments |
gptkbp:operating_system |
gptkb:Ne_XTSTEP
|
gptkbp:provides |
Access Control
Data Integrity User Authentication |
gptkbp:released_in |
gptkb:1989
|
gptkbp:replaced_by |
Modern Operating Systems
mac OS Security Features |
gptkbp:setting |
gptkb:High_School
Security Features Security Policies Virtual Environments Access Controls Network Environments |
gptkbp:supports |
gptkb:software
Encryption Remote Access |