Policies DesignWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policies Design returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Endpoint Security
 •   Access Control
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Authentication / Password Management

Related Searches
 •   Cases Policies
 •   Controls Policies Design
 •   Methodology Policies
 •   Policies Design Networking
 •   Policies Design Policy
 •   Policies Design Specialists
 •   Policies Vendor
 •   Problem Policies
 •   Seminars Policies Design
 •   Whitepaper Policies
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Intel, Dell, VMware Policy-based, Cloud Power Management Design by Intel

August 2011 - (Free Research)
This white paper is designed to help companies prepare for the cloud by maximising power efficiency and improving management. Get detailed information on policy based power management use cases, pre-requisites, steps for execution, and results. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Design Security Policies For #GenMobile by Aruba Networks

April 2014 - (Free Research)
This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Veritas NetBackup™ 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies by Symantec Corporation

February 2008 - (Free Research)
This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage is used cost-effectively while still maintaining appropriate levels of recoverability. 
(WHITE PAPER) READ ABSTRACT |

Oracle WebLogic Suite 11g Technical White Paper by Oracle Corporation

June 2009 - (Free Research)
Oracle WebLogic Suite 11g is a significant new release of the core application grid infrastructure foundation underpinning Oracle Fusion Middleware. It has been designed to provide a standards-based, mission-critical platform for organizations that deploy application grid and service-oriented architectures. 
(WHITE PAPER) READ ABSTRACT |

Planning and Design for a Data Centre Electrical Power Infrastructure: Distribution, UPS, Safety and Savings by SOCOMEC Group

February 2011 - (Free Research)
This paper examines that a data centre design  must meet specific requirements including; site selection, space, available power, air conditioning, load, environmental quality, and risk evaluation, but also the requirements of the electrical power supply system. It is also discusses how necessary it is to consider the cost of service downtime. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware* by Intel

April 2011 - (Free Research)
This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT. 
(WHITE PAPER) READ ABSTRACT |

Enforcing Endpoint Security: Creating a Network Security Policy by SearchSecurity.com

June 2012 - (Free Research)
As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them. 
(EGUIDE) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Make Group Policies Do More and Reach Further by Dell Software

June 2012 - (Free Research)
This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

Managing mobile UC in a BYOD environment by SearchSecurity.com

July 2012 - (Free Research)
This e-guide reviews key tips and considerations to keep in mind when designing mobile UC and Bring Your Own Device (BYOD) policies to keep sensitive information secure while enabling increased flexibility and mobility. 
(EGUIDE) READ ABSTRACT |

Voice Architectures and Deployment Models by Global Knowledge

December 2008 - (Free Research)
Telephony design requires a solid understanding of the drivers for Voice over IP, corporate policies for infrastructure design, and telephone components. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

Intel Cloud Builders Guide: Policy Based Power Management with Dell and VMware by Intel

October 2011 - (Free Research)
This resource assists IT pros and administrators seeking power management solutions to increase data center efficiency. Multiple power design options are presented, including: real-time server monitoring and optimization of rack density to optimize productivity and reduce total cost of ownership (TCO). 
(WHITE PAPER) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Adaptive Security for the Health/Pharma Vertical by Juniper Networks, Inc.

April 2011 - (Free Research)
Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges. 
(WHITE PAPER) READ ABSTRACT |

Flexible Work: Rhetoric and Reality by Citrix Online - GotoMyPC

November 2008 - (Free Research)
Experts have been predicting an explosion in the mobile workforce trend for years, to learn more about this trend Citrix Online and the Work Design Collaborative joined forces to conduct a survey about trends in flexible work policies and technology. 
(WHITE PAPER) READ ABSTRACT |

Securing the Next-Generation Data Center by McAfee, Inc.

August 2011 - (Free Research)
Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation. 
(WHITE PAPER) READ ABSTRACT |

Mail Attender, Archive Attender, Discovery Attender & PST Backup Attender by Sherpa Software

May 2011 - (Free Research)
Although Microsoft introduced a number of features designed to accommodate the Exchange 2010 larger inbox size, your business may require a more sophisticated approach to retention policies, content management or searching. This white paper reveals software that supplements Microsoft Exchange 2010 Deployment and expands administrative control. 
(WHITE PAPER) READ ABSTRACT |

RSA Data Loss Prevention Suite: Uncover Your Risk, Establish Control by RSA, The Security Division of EMC

February 2009 - (Free Research)
Check out this white paper to learn how RSA Data Loss Prevention mitigates risks to sensitive data, achieves scalability, and lowers total cost of ownership. 
(ARTICLE) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts