Policy-Based Network Management Research
-
Reducing the Risks of Social Media
Sponsored by: TechTarget SecuritySocial Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
-
BYOD: Policy Creation and it's Increasingly Growing Need
Sponsored by: TechTarget SecurityThis expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
-
Software-Defined Networking Could Make Network-as-a-Service a Reality
Sponsored by: TechTarget SecurityThis E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
-
E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
Sponsored by: TechTarget SecurityThis E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
-
How Consumerization Affects Security and Compliance
Sponsored by: TechTarget SecurityThe trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
-
Alteon Stackable Web Switches 180 and ACEdirector Series
Sponsored by: Nortel Networks CorporationThe Alteon 180 and AD series provide an ideal solution for enterprises and service providers to maximize their network and server investment.
-
Putting Network Security Into Context
Sponsored by: TechTarget NetworkingToday's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.
-
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
Sponsored by: Hewlett-Packard EnterprisePrevent future cyber attacks from occurring by modifying your company's security infrastructure.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
SDN technologies primer: Revolution or evolution in architecture?
Sponsored by: EnterasysWhile there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.
-
BYOD Security Policy, not MDM, at Heart of Smartphone Security
Sponsored by: Symantec CorporationThis E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
-
Mobile Configuration Management Functions for Successful MDM
Sponsored by: Citrix Systems, Inc.This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
-
What You Need to Know About the Costs of Mobility
Sponsored by: iPass Inc.Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy.
-
Cashing in on Policy-based Power Management
Sponsored by: IntelIn today’s ever-growing data centers, no one takes power for granted. There have been many reminders of the threats to power supplies— including catastrophic natural events, breakdowns in the power grid, and seasonal power shortages. This white paper describes how policy-based power management can reign in energy use and significantly cut costs.
-
Why Business Rules?: A Case for Business Users of Information Technology
Sponsored by: IBMThis whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
-
The Seven Common Challenges of Administering Active Directory
Sponsored by: NetIQ EuropeThis white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
-
Keep Your Enemies Closer - Get Proactive about Security
Sponsored by: AT&T CorpForrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
-
Next-Generation Firewall
Sponsored by: SonicWALLIt can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
-
File Security: Audit and Protect Critical Files
Sponsored by: ImpervaRead this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
-
Why Your Organization Needs to Implement DLP
Sponsored by: Trend Micro, Inc.Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
-
Policy Reference Guide: Blackberry Enterprise Server
Sponsored by: BlackBerryDevices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite.
-
A New Dimension in IT Infrastructure Management
Sponsored by: Raritan Inc.This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
-
Longhorn Server and New Group Policy Settings
Sponsored by: Global KnowledgeWith the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.