Software  >   Systems Software  >   Network Management Software  >  

Policy Management Software

RSS Feed   
Policy Management Software Reports
 
IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Passwordless Authentication: How Giving Up Your Password Might Make You More Secure
sponsored by Thales
WHITE PAPER: Password fatigue has become an epidemic, with 81% of breaches involving the use of weak or stolen credentials. As a result, enterprises are exploring ways to protect their networks without the use of passwords. Jump into this white paper to learn more and to see examples of passwordless authentication.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

Networks Start to Get SASE in 2020
sponsored by Apcela
WHITE PAPER: Companies engaged in digital transformation efforts already understand that security and network services are converging. Now, that convergence has a new name: “secure access service edge,” or SASE. In this white paper, learn more about the SASE model and how it can help your organization by placing access control closer to the user.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Apcela

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

How Continuous, Automated Red-Teaming Can Elevate Your Security Posture
sponsored by Randori
WHITE PAPER: Security teams are recognizing that a continuously evolving IT ecosystem demands a shift in tactics. Continuous, automated red team testing can help enterprises adopt a risk-based and adversary-focused security approach to ensure that they are prepared to defend against evolving threats. Dive into this S&P Global brief to get the specifics.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences