IT Management  >   Systems Operations  >   Network Management  >  

Network Resource Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Resource Management Reports
 
Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges in implementing an effective mobile strategy and the 4 key steps you can take to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

SearchSecurity.com

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Symantec & Blue Coat Systems

Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA
WHITE PAPER: Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

RSA

Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011

Imperva

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8
sponsored by Tripwire, Inc.
DATA SHEET: Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement