IT Management  >   Systems Operations  >   Network Management  >  

PBN

RSS Feed    Add to Google    Add to My Yahoo!
PBNReports
 
How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

SearchSecurity.com

E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

SearchSecurity.com

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

Why Business Rules: A Case for Business Consumers of Information Technology
sponsored by IBM
WHITE PAPER: This paper examines the relationship between business and IT groups within the typical enterprise and explores how the implementation of a Business Rules Management System (BRMS) allows both groups find common ground.
Posted: 02 Dec 2008 | Published: 01 Mar 2006

IBM

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA, The Security Division of EMC
WHITE PAPER: As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

RSA, The Security Division of EMC

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PBN White Papers | PBN Multimedia | PBN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement