Software  >   Systems Software  >   Network Management Software  >  

Policy Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Policy Management Software Reports
 
SunRice Reboots Their Cyberthreat Defense & ROBO Network Security
sponsored by Palo Alto Networks
CASE STUDY: In this case study, SunRice illustrates how to leverage a centralized security policy management platform to bolster cyber-threat defense and improve visibility of network infrastructure. Access now to streamline network security management and learn how to consolidate outdated legacy appliances.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Palo Alto Networks

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

Cirrus Configuraton Management Software v3 - 30 Day Trial
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Management Software v3 will increase availability, security and policy adherence while decreasing your time spent managing devices. Try this free product download now.
Posted: 07 Jul 2006 | Premiered: 07 Jul 2006

SolarWinds, Inc.

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

NYU Shanghai Delivers a Higher Degree of Network Performance
sponsored by CommScope
WHITE PAPER: In this case study, you'll learn how NYU Shanghai was able to improve networking, support voice-over-IP calls, remote VPN, and more with their newly designed data center. Discover ways their strategy could benefit you.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

CommScope

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Overcoming Siebel Complexity to Achieve Agile and Continuous Deployments
sponsored by Automic
WEBCAST: This webcast explores how you can successfully and efficiently automate Siebel CRM deployments with one automation platform. Find out how this platform enables your business with service orchestration, release automation, and workload automation.
Posted: 09 Aug 2016 | Premiered: Aug 9, 2016

Automic

Data Diaries: How VMware Built a Community around Analytics
sponsored by Tableau Software
WHITE PAPER: In order to prevent disarray, businesses need to empower people in an accurate and scalable way. The best way to achieve this is by fostering a culture of self-service analytics. Find out how VMware built a community around data analysis, and ultimately gained access to better visualization and insights.
Posted: 08 Jul 2016 | Published: 16 Oct 2015

Tableau Software

Strategies for Implementing Windows 10
sponsored by Flexera Software
WHITE PAPER: Universal Applications may be one of the most important features of Windows 10. However, this new technology could cause compatibility issues with apps for enterprise deployments. Find out how you can test hundreds of apps and performance levels with the push of a button and deploy Windows 10 successfully.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Flexera Software

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement