IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Network Management

RSS Feed   
ALSO CALLED: Policy-Based Management (Network Management), Policy-Based Networking, Group Policy Management, Network Policy Management, PBN, Network Resource Management, Policy Management
DEFINITION: Policy-based management is an administrative approach that is used to simplify the management of a given endeavor by establishing policies to deal with situations that are likely to occur. Policies are operating rules that can be referred to as a way to maintain order, security, consistency, or otherwise furth a goal or mission. For example, a town council might have a policy against hiring the relatives  … 

Policy-Based Network Management definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Policy-Based Network Management Reports
1 - 25 of 58 Matches Previous Page  |  Next Page
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Making it Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint

Market Guide for Managed Detection and Response Services
sponsored by eSentire
ANALYST REPORT: Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.
Posted: 16 Feb 2021 | Published: 26 Aug 2020

eSentire

How Continuous, Automated Red-Teaming Can Elevate Your Security Posture
sponsored by Randori
WHITE PAPER: Security teams are recognizing that a continuously evolving IT ecosystem demands a shift in tactics. Continuous, automated red team testing can help enterprises adopt a risk-based and adversary-focused security approach to ensure that they are prepared to defend against evolving threats. Dive into this S&P Global brief to get the specifics.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

Secure Remote Access solutions: A Buyer’s Guide
sponsored by Redcentric Solutions Ltd
EBOOK: Businesses are on a limb when it comes to risk management. Getting employees online in a safe manner is a frequent conversation piece, and security professionals hear about it every day. It’s time to give your employees the best secure remote experience possible. Leverage this white paper to learn how to remove risk from remote access.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Redcentric Solutions Ltd

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

MyID – Replacing Central Access Management with a State-of-the-Art IAM Solution
sponsored by IC Consult
CASE STUDY: Legacy authentication lacks flexibility, availability and security. Businesses are now searching for future-proof solutions that can optimize the flexibility of IT services by providing innovative and secure authentication methods. Peruse this case study to learn how iC Consult provided an enterprise-wide IAM solution through a hybrid cloud.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

IC Consult

Ransomware Tabletop Exercise
sponsored by CI Security
WEBCAST: Most organizations don’t have a plan to react to ransomware, and the ones that do may not have fully updated it. Be prepared for the worst – watch this webcast to see Mike Simon, CTO of CI Security, lead a 60-minute virtual tabletop exercise featuring a ransomware attack simulation and how a company responds to it.
Posted: 07 Jan 2021 | Premiered: Dec 8, 2020

CI Security

Navy Federal Credit Union on Security During Crisis
sponsored by Synack
WEBCAST: Leading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.
Posted: 07 Jan 2021 | Premiered: Jan 7, 2021

Synack

Simplify Zero-Trust Security from the Cloud
sponsored by JumpCloud
WHITE PAPER: The surging number of remote users, device types and cloud-based resources calls for a security framework that grants access to identity, device and network rather than only one or two. This is the essence of zero trust. Open this white paper to view a specific outline of zero-trust security and how to implement it with a cloud directory platform.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

JumpCloud

Sophos Incident Response Guide
sponsored by Sophos
WHITE PAPER: Preparation is the best way to avoid letting a cyberattack turn into a full breach. After a breach, organizations often realize they could have avoided a lot of cost, pain and disruption if they’d had an effective incident response plan in place. Download this white paper to learn 10 steps for creating such a plan and keep attacks from evolving.
Posted: 14 Dec 2020 | Published: 09 Oct 2020

Sophos

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

Creating a Culture of Security
sponsored by HelpSystems
WHITE PAPER: You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK: By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020

Proofpoint

Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Operational Cost, Security-Related Risk: Quantifying the Value of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increased security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc
1 - 25 of 58 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info