IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Network Management

RSS Feed   
ALSO CALLED: Policy-Based Management (Network Management), Policy-Based Networking, Group Policy Management, Network Policy Management, PBN, Network Resource Management, Policy Management
DEFINITION: Policy-based management is an administrative approach that is used to simplify the management of a given endeavor by establishing policies to deal with situations that are likely to occur. Policies are operating rules that can be referred to as a way to maintain order, security, consistency, or otherwise furth a goal or mission. For example, a town council might have a policy against hiring the relatives  … 

Policy-Based Network Management definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Policy-Based Network Management Reports
1 - 25 of 52 Matches Previous Page  |  Next Page
Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Improve Data Security in the Modern Enterprise
sponsored by Fasoo
EGUIDE: If your organization has begun an initiative around improving data security, it’s important to monitor the amount of data you’re collecting in order not to create too much risk. Learn more tips like these in our expert guide, Improve Data Security in the Modern Enterprise.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Fasoo

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK: By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020

Proofpoint

Remote Work Demands a Zero-Trust Approach for Both Apps and Users
sponsored by Citrix
RESOURCE: Workers are now accessing data outside of the office, which means that VPNs and basic anti-malware/antivirus software are no longer providing ample security for apps and data. Read this custom article to understand the benefits of zero-trust network architecture, which includes an embedded two-minute video on why the time for zero-trust is now.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Citrix

Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

7 Habits of Highly Effective SOCs
sponsored by Expel
WHITE PAPER: Because so many organizations are having to alter their security posture, many of them are building security operations centers (SOCs) to increase visibility and perform security analytics for best practice development. So what makes a highly effective SOC? Read this white paper to learn 7 key principles to make your SOC more productive.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Expel

Identification and Access Management: Some Possible Futures
sponsored by BIO-key International
EGUIDE: Password fatigue is crippling network security. With the average person owning more than 40 accounts, weak passwords are abound, not least in the enterprise. The future of authentication must take on a different look if businesses are to remain secure. Jump into this e-guide to explore methods of passwordless identity management.
Posted: 03 Nov 2020 | Published: 30 Oct 2020

BIO-key International

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Operational Cost, Security-Related Risk: Quantifying the Value of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increased security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon

You’ve Been Compromised: Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Smart cybersecurity operations require extensive preparation and planning. Without them, organizations run the risk of poorly coordinated incident response (IR) activities that could cause more damage than the compromise itself. So how do you respond the right way? Read this white paper to get the answer.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

How to Enhance Cybersecurity as Your Office Reopens
sponsored by Keeper Security Inc
RESOURCE: No matter when the world will be ready to return the office, it’s never a bad idea to evaluate (or reevaluate) cybersecurity in your organization. Everything from device management to training to policies should be carefully scrutinized. Need help getting started? Check out this infographic for 5 ways to enhance cybersecurity.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Cox Communications: The Anatomy of an Email Hack
sponsored by Cox Communications, Inc.
WEBCAST: Email security has never been under greater threat. The boom in remote employees accessing private networks has demanded more of firewalls than ever before, and as such, there are bound to be some attacks that will work their way through. Watch this webcast to understand the anatomy of a live email hack.
Posted: 06 Oct 2020 | Premiered: Oct 6, 2020

Cox Communications, Inc.

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

Definitive Guide to Zero-Trust Security
sponsored by ColorTokens
EBOOK: Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

ColorTokens

Key Tenets of Zero Trust Architecture
sponsored by ColorTokens
RESOURCE: Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.
Posted: 30 Sep 2020 | Published: 04 Sep 2020

ColorTokens

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon

4-step Work From Home Guide
sponsored by HCL Software
WHITE PAPER: When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Software

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Unpacking Research on Employee Security Awareness
sponsored by Mimecast
WEBCAST: The numbers are in: Information alone does not change people’s minds. Organizations will attempt to mold their employees into security encyclopedias, but without proper behavioral analysis, no amount of training will do what is desired.Immerse yourself in this webcast, which unpacks Forrester research and gets to the bottom of security awareness.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Mimecast
1 - 25 of 52 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info