IT Management  >   Systems Operations  >   Network Management  >  

Network Policy Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Policy Management White Papers (View All Report Types)
 
Why Business Rules: A Case for Business Consumers of Information Technology
sponsored by IBM
WHITE PAPER: This paper examines the relationship between business and IT groups within the typical enterprise and explores how the implementation of a Business Rules Management System (BRMS) allows both groups find common ground.
Posted: 02 Dec 2008 | Published: 01 Mar 2006

IBM

Cashing in on Policy-based Power Management
sponsored by Intel
WHITE PAPER: In today’s ever-growing data centers, no one takes power for granted. There have been many reminders of the threats to power supplies— including catastrophic natural events, breakdowns in the power grid, and seasonal power shortages. This white paper describes how policy-based power management can reign in energy use and significantly cut costs.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

Intel

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011

Imperva

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA
WHITE PAPER: Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

RSA

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

File Security: Audit and Protect Critical Files
sponsored by Imperva
WHITE PAPER: Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement