Software  >   Systems Software  >   Network Management Software  >  

Policy-Based Management Software (Network Management)

RSS Feed   
Policy-Based Management Software (Network Management) Reports
 
Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Passwordless Authentication: How Giving Up Your Password Might Make You More Secure
sponsored by Thales
WHITE PAPER: Password fatigue has become an epidemic, with 81% of breaches involving the use of weak or stolen credentials. As a result, enterprises are exploring ways to protect their networks without the use of passwords. Jump into this white paper to learn more and to see examples of passwordless authentication.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

Iot Platform Leader Armis Eliminates Dependency On Vpn Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

A Computer Weekly E-Guide to Network Management & Monitoring
sponsored by ComputerWeekly.com
EGUIDE: Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

2021 Top Sd-Wan Edge Trends
sponsored by Silver Peak
EBOOK: SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Silver Peak

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences