IT Management  >   Systems Operations  >   Network Management  >  

Group Policy Management

RSS Feed    Add to Google    Add to My Yahoo!
Group Policy Management Reports
 
Buyer's Guide to Identity and Access Management Solutions
sponsored by IBM
WHITE PAPER: Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs.
Posted: 09 Jan 2017 | Published: 31 Jul 2016

IBM

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com

SDN technologies primer: Revolution or evolution in architecture?
sponsored by Enterasys
EGUIDE: While there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Enterasys

File Security: Audit and Protect Critical Files
sponsored by Imperva
WHITE PAPER: Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Imperva

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement