IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Networking

RSS Feed    Add to Google    Add to My Yahoo!
Policy-Based NetworkingReports
 
Governance for All: Empowering IT and Business Content Owners
sponsored by Dell Software
WHITE PAPER: "Governance for all" is more than an end goal written in a plan; it's a strategy that unites IT and business content owners in a common goal. Now you can learn to create a governance strategy to suit all your needs.
Posted: 21 Feb 2013 | Published: 31 Dec 2012

Dell Software

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER: This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004

Raritan Inc.

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011

Imperva

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement