IT Management  >   Systems Operations  >   Network Management  >  

Network Resource Management

RSS Feed   
Network Resource Management Reports
 
How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

SearchSecurity.com

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

Alteon Stackable Web Switches 180 and ACEdirector Series
sponsored by Nortel Networks Corporation
DATA SHEET: The Alteon 180 and AD series provide an ideal solution for enterprises and service providers to maximize their network and server investment.
Posted: 27 Oct 2002 | Published: 01 Mar 2002

Nortel Networks Corporation

E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

SearchSecurity.com

Reducing the Risks of Social Media
sponsored by SearchSecurity.com
EGUIDE: Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SearchSecurity.com

Responding to public sector cyber security threats: Views of public sector professionals and where to from here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences