IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Management (Network Management)

RSS Feed   
Policy-Based Management (Network Management) Reports
 
How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

SearchSecurity.com

Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
Posted: 05 Nov 2012 | Published: 09 Apr 2012

SearchSecurity.com

Reducing the Risks of Social Media
sponsored by SearchSecurity.com
EGUIDE: Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SearchSecurity.com

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Policy Reference Guide: Blackberry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER: This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004

Raritan Inc.

Putting Network Security Into Context
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.
Posted: 12 Nov 2014 | Published: 14 Nov 2013

SearchNetworking.com

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info