IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Management (Network Management)

RSS Feed   
Policy-Based Management (Network Management) Reports
 
The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
Posted: 05 Nov 2012 | Published: 09 Apr 2012

SearchSecurity.com

Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

How to Enhance Cybersecurity as Your Office Reopens
sponsored by Keeper Security Inc
RESOURCE: No matter when the world will be ready to return the office, it’s never a bad idea to evaluate (or reevaluate) cybersecurity in your organization. Everything from device management to training to policies should be carefully scrutinized. Need help getting started? Check out this infographic for 5 ways to enhance cybersecurity.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

Sophos Incident Response Guide
sponsored by Sophos
WHITE PAPER: Preparation is the best way to avoid letting a cyberattack turn into a full breach. After a breach, organizations often realize they could have avoided a lot of cost, pain and disruption if they’d had an effective incident response plan in place. Download this white paper to learn 10 steps for creating such a plan and keep attacks from evolving.
Posted: 14 Dec 2020 | Published: 09 Oct 2020

Sophos

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info