IT Management  >   Systems Operations  >   Network Management  >  

Network Resource Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Resource Management Reports
Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by
EGUIDE: This E-Guide from explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
Posted: 05 Nov 2012 | Published: 09 Apr 2012

Automating IT Security Audits to Demonstrate Compliance and Protect Data
sponsored by NetIQ Europe
WHITE PAPER: This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Enterprise

SDN technologies primer: Revolution or evolution in architecture?
sponsored by Enterasys
EGUIDE: While there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.
Posted: 23 Aug 2013 | Published: 23 Aug 2013


Granular application control, intelligence and real-time visualization
sponsored by SonicWALL
WHITE PAPER: Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls.
Posted: 17 Mar 2011 | Published: 17 Mar 2011


Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA
WHITE PAPER: As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.
Posted: 02 Dec 2010 | Published: 02 Dec 2010


Protect, Detect, and Correct: What's New in Tripwire Enterprise 8
sponsored by Tripwire, Inc.
DATA SHEET: Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement