Software  >   Systems Software  >   Network Management Software  >  

Network Policy Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Policy Management Software White Papers (View All Report Types)
 
Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Networks That Know Optimization: Build a Business Case for Network Virtualization
sponsored by Juniper Networks, Inc.
WHITE PAPER: The first wave of virtualization and cloud computing brought great advances, but networks are already at their limits and new waves of are coming. Read on to learn about designing next-generation network architectures to handle the coming technological advances.
Posted: 27 Mar 2015 | Published: 30 Dec 2014

Juniper Networks, Inc.

Agile Development: Why Requirements Matter
sponsored by IBM
WHITE PAPER: Discover how requirements management can bring significant value to agile development in IT-regulated and complex product development projects. Learn how, with the right processes and automations in place, managing requirements can help improve your productivity.
Posted: 05 Jul 2016 | Published: 30 Sep 2014

IBM

Big Tap Monitoring Fabric: Tap Sharing
sponsored by Big Switch Networks
WHITE PAPER: With the advent of SDN on Bare Metal Ethernet Switches, making the jump to third-generation, multitenant monitoring fabric for tap sharing is an increasingly attractive option from a CapEx, OpEx and design transition perspective. Read this white paper that explains how making the jump to SDN can absolve your networking issues.
Posted: 24 Jun 2016 | Published: 31 Dec 2014

Big Switch Networks

Software-Defined, Business-Driven
sponsored by Verizon
WHITE PAPER: Is your network meeting today's needs, let alone future of connectivity? Learn how SDN has changed the way we look at networks, shifting from a technology-centric view to a workflow-centric view.
Posted: 09 May 2016 | Published: 30 Oct 2015

Verizon

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

Case Study: How Varian Medical Systems Employees Became More Productive with Mobile Solutions
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

MobileIron

Enterprise Mobility Management: Real Benefits In Today’s Mobile World
sponsored by VMware, Inc.
WHITE PAPER: This white paper relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware, Inc.

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: The software-defined data center (SDDC) is an integral part of network virtualization. Discover ways network virtualization fits in with today's priorities, whether that's closing dangerous gaps in data center security, automating processes, or supporting application continuity.
Posted: 16 May 2016 | Published: 16 May 2016

VMware

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement