IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Networking

RSS Feed    Add to Google    Add to My Yahoo!
Policy-Based Networking Reports
 
E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

SearchSecurity.com

Reducing the Risks of Social Media
sponsored by SearchSecurity.com
EGUIDE: Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SearchSecurity.com

SDN technologies primer: Revolution or evolution in architecture?
sponsored by Enterasys
EGUIDE: While there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Enterasys

Managing Data, Managing Change: Making MDM Work
sponsored by Baseline Consulting
WHITE PAPER: This white paper discusses, Business Change Management, Data Change Management, and Cultural Change Management. These are the three main categories of change management that accompany any Master Data Management (MDM) effort.
Posted: 26 Sep 2008 | Published: 26 Sep 2008

Baseline Consulting

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Granular application control, intelligence and real-time visualization
sponsored by SonicWALL
WHITE PAPER: Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SonicWALL

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Limited
WHITE PAPER: Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Limited

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Cirrus Configuraton Management Software v3 - 30 Day Trial
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Management Software v3 will increase availability, security and policy adherence while decreasing your time spent managing devices. Try this free product download now.
Posted: 07 Jul 2006 | Premiered: 07 Jul 2006

SolarWinds, Inc.

A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER: This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004

Raritan Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement