Public Policy Making

RSS Feed    Add to Google    Add to My Yahoo!
Public Policy MakingReports
25 Matches
Is the Public Cloud Secure? The Truth from Public Cloud Customers
sponsored by CenturyLink Cloud
WHITE PAPER: This white paper contains two cases studies that illustrate how access to top-rated security experts and ensured compliance can be more valuable than actual cost savings.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

CenturyLink Cloud

Cloud computing in the public sector
sponsored by ComputerWeekly.com
WHITE PAPER: This report looks at the promise and issues of cloud computing as described today, along with the direction cloud needs to take in order to fulfil on its promise.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Healthsense: A publication for healthcare IT professionals
sponsored by AppSense
NEWSLETTER: Find out how desktop and application virtualization is transforming the healthcare industry to enhance employee productivity, securely share health information, and reduce costs in a multiplatform end-user computing environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

AppSense

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

Defining Your Corporate Mobile Policies
sponsored by SearchSecurity.com
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

SearchSecurity.com

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

Creating the hybrid organisation: Making public and private sector organisations relevant in the new economy
sponsored by ComputerWeekly.com
WHITE PAPER: This paper aims to explore the role and relevance of organisations in a future defined by economic uncertainty, changing workforce demographics, globalisation and rapid developments in social and business technologies.
Posted: 24 Oct 2011 | Published: 15 Jun 2010

ComputerWeekly.com

Making WLANs Work Reliably and Cost-Effectively
sponsored by Ruckus Wireless
WHITE PAPER: This exclusive white paper details a WLAN solution that will not only make the network more reliable, but also make it more cost effective.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Ruckus Wireless

City University London Policy Challenge Report: Removing barriers to government using SME IT suppliers
sponsored by ComputerWeekly.com
WHITE PAPER: The present need to radically cut public expenditure provides a once in a generation opportunity to transform the efficiency of the public sector. In order to achieve this, the public sector needs to radically change its current business processes to achieve greater efficiency.
Posted: 21 Oct 2011 | Published: 18 Aug 2010

ComputerWeekly.com

The Insider’s Guide to New Era Policy-Based Governance
sponsored by VMware
WHITE PAPER: This whitepaper offers a software-defined-data-center as solution for fixing antiquated IT infrastructure and making the IT department more agile.
Posted: 28 Mar 2014 | Published: 22 Mar 2013

VMware

Public Cloud Security Tips and Best Practices
sponsored by SearchBusinessAnalytics
EGUIDE: This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

SearchBusinessAnalytics

A Computer Weekly buyer's guide to public open data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The 11-page buyer's buyers guide looks at the latest the in the publication and use of open data by government and the private sector.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

SearchSecurity.com

Making the Case for a BYOD Alternative
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to find out why your business should implement COPE and learn how to cut down device chaos, reduce costs, tighten content control, and more!
Posted: 03 Jun 2014 | Published: 30 Jul 2014

CA Technologies.

Best Practices for Making BYOD Simple and Secure
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper presents practical guidance and best practices for using desktop virtualization, a self-service app store and secure file sharing and synchronization to deliver on-demand files, apps and desktops to any type of device, allowing organizations to leverage the full power of consumerization.
Posted: 19 Nov 2012 | Published: 30 Mar 2012

Citrix Systems, Inc.

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

Assess Mobile Devices Before Making a Management Plan
sponsored by SearchConsumerization.com
EBOOK: Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, applications and data. Mobile device management must account for who owns what and how it will be monitored and secured.
Posted: 04 Mar 2014 | Published: 06 Mar 2014


Solution Spotlight: Public Cloud
sponsored by CDW Corporation
WHITE PAPER: This exclusive whitepaper examines the benefits of moving to the public cloud.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

The Best of Public and Private Clouds
sponsored by VMware
WHITE PAPER: Access this expert e-guide to get insight into how to combine the best of private and public clouds. You'll also get tips and strategies for building an efficient and successful hybrid cloud model. Read on to learn more!
Posted: 03 Nov 2014 | Published: 31 Oct 2014

VMware

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

CW+: Quocirca report: Effective public sector citizen communication
sponsored by ComputerWeekly.com
WHITE PAPER: The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change.
Posted: 21 Oct 2011 | Published: 12 Aug 2010

ComputerWeekly.com

Analytical reporting: Inside IBM Cognos
sponsored by IBM
WHITE PAPER: The following white paper outlines an analytics solution that can provide a full range of analytic capabilities to your entire organization that will lead to a much stronger competitive presence in today's market.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

IBM

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement