BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE:
This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013
|
|
|
InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST:
Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020
|
|
|
IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY:
Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021
|
|
|
E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE:
This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012
|
|
|
Alteon Stackable Web Switches 180 and ACEdirector Series
sponsored by Nortel Networks Corporation
DATA SHEET:
The Alteon 180 and AD series provide an ideal solution for enterprises and service providers to maximize their network and server investment.
Posted: 27 Oct 2002 | Published: 01 Mar 2002
|
|
|
Improve Data Security in the Modern Enterprise
sponsored by Fasoo
EGUIDE:
If your organization has begun an initiative around improving data security, it’s important to monitor the amount of data you’re collecting in order not to create too much risk. Learn more tips like these in our expert guide, Improve Data Security in the Modern Enterprise.
Posted: 23 Nov 2020 | Published: 23 Nov 2020
|
|
|
SDN technologies primer: Revolution or evolution in architecture?
sponsored by Enterasys
EGUIDE:
While there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.
Posted: 23 Aug 2013 | Published: 23 Aug 2013
|
|
|
Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER:
With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007
|
|
|
What You Need to Know About the Costs of Mobility
sponsored by iPass Inc.
WHITE PAPER:
Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy.
Posted: 30 Jan 2012 | Published: 27 Jan 2012
|
|
|
A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER:
This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004
|
|
|
|
|