IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Management (Network Management)

RSS Feed    Add to Google    Add to My Yahoo!
Policy-Based Management (Network Management) Multimedia (View All Report Types)
 
Cirrus Configuraton Management Software v3 - 30 Day Trial
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Management Software v3 will increase availability, security and policy adherence while decreasing your time spent managing devices. Try this free product download now.
Posted: 07 Jul 2006 | Premiered: 07 Jul 2006

SolarWinds, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Fundamentals of Application Release and Deployment
sponsored by IBM
WEBCAST: This webcast discusses strategies for automating the construction of applications as well as release and deployment.
Posted: 20 Jul 2015 | Premiered: Jun 19, 2014

IBM

Transform Your Customer's Network Infrastructure and Amplify Your Profitability
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video to see how HP's Networking Converged Campus offerings can work for your organization.
Posted: 21 Apr 2015 | Premiered: Apr 16, 2015

Hewlett-Packard Company

Case Study - ABN Amro: From VMware Sphere to the Software-Defined Data Center
sponsored by VMware
VIDEO: This video details how one global IT company started its virtualization journey with consolidation and disaster recovery, and are now able to deploy many machines with network virtualization.
Posted: 27 Aug 2015 | Premiered: 30 Nov 2013

VMware

Case Study: Achieving Simplified, Next-Generation Networks with SDN
sponsored by F5 Networks
VIDEO: In this brief video, representatives from the cloud provider Pulsant discuss why they chose to adopt software-defined networking (SDN) and network functions virtualization (NFV) to better handle their customers' demands.
Posted: 26 Aug 2015 | Premiered: 19 Jan 2015

F5 Networks

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Dean Darwin and Soni Jiandani on F5 and Cisco Partnership
sponsored by F5 Networks
WEBCAST: This short webcast features a discussion between representatives of Cisco and F5 about how they are creating products in a relationship that is driven by development rather than marketing.
Posted: 26 Aug 2015 | Premiered: Feb 10, 2015

F5 Networks

Understanding BYOE and How Today's User Experience Drive Value for UC
sponsored by ShoreTel
WEBCAST: View this webcast to learn how a BYOE strategy can improve the performance of every department in your company.
Posted: 13 Mar 2015 | Premiered: Mar 13, 2015

ShoreTel

Learn about IBM Workload Automation SaaS Solutions
sponsored by IBM
VIDEO: Access this short video to learn about how a workload automation solution can help automate both simple and complex business processes in your enterprise.
Posted: 28 Aug 2015 | Premiered: 07 Aug 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement