Network Policy Management Reports

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by TechTarget Security
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

TechTarget Security

Alteon Stackable Web Switches 180 and ACEdirector Series
sponsored by Nortel Networks Corporation
DATA SHEET: The Alteon 180 and AD series provide an ideal solution for enterprises and service providers to maximize their network and server investment.
Posted: 27 Oct 2002 | Published: 01 Mar 2002

Nortel Networks Corporation

Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Policy Reference Guide: Blackberry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Cashing in on Policy-based Power Management
sponsored by Intel
WHITE PAPER: In today’s ever-growing data centers, no one takes power for granted. There have been many reminders of the threats to power supplies— including catastrophic natural events, breakdowns in the power grid, and seasonal power shortages. This white paper describes how policy-based power management can reign in energy use and significantly cut costs.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

Intel

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Putting Network Security Into Context
sponsored by TechTarget Networking
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.
Posted: 12 Nov 2014 | Published: 14 Nov 2013

TechTarget Networking