Software  >   Systems Software  >   Network Management Software  >  

Network Policy Management Software

RSS Feed   
Network Policy Management Software Reports
 
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

Passwordless Authentication: How Giving Up Your Password Might Make You More Secure
sponsored by Thales
WHITE PAPER: Password fatigue has become an epidemic, with 81% of breaches involving the use of weak or stolen credentials. As a result, enterprises are exploring ways to protect their networks without the use of passwords. Jump into this white paper to learn more and to see examples of passwordless authentication.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Iot Platform Leader Armis Eliminates Dependency On Vpn Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

2021 Top Sd-Wan Edge Trends
sponsored by Silver Peak
EBOOK: SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Silver Peak

Setting up IT for success
sponsored by Aruba Networks
EBOOK: For most businesses, harnessing the power of the Edge presents some formidable challenges. Aruba surveyed 2,400 IT leaders to get insight on what obstacles they are facing and where technology solutions can help empower them to adapt quickly and position their businesses for growth. Download this e-book to explore key findings from the survey.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Aruba Networks

Getting the best out of robotic process automation
sponsored by ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences