Policy FunctionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policy Function returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Network Security
 •   Data Security
 •   Security Monitoring
 •   Application Security
 •   Endpoint Security
 •   Network Management
 •   Authentication / Password Management
 •   Managed Security Services
 •   Mobile Device Management

Related Searches
 •   List Policy Function
 •   New Policy Function
 •   Policy Function Commercial
 •   Policy Function Consulting
 •   Policy Function Definition
 •   Policy Function New Mexico
 •   Policy Function System Software
 •   Policy Function Tutorial
 •   Recovery Policy Function
 •   Utility Policy
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Process Automation for the Twenty-Ten Decade: The Automation of Business Technology by Network Automation, Inc

October 27, 2010 - (Free Research)
This paper discusses the need for business process automation and how it can make your company vastly more efficient. Continue reading to learn how to stay ahead of the curve on process automation during the twenty-ten decade. 
(WHITE PAPER) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by Citrix Systems, Inc. (E-mail this company)

March 12, 2013 - (Free Research)
This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more. 
(EGUIDE) READ ABSTRACT |

Network Boost: control all data in your network and accelerate your data exchanges by Orange Business Services

April 07, 2009 - (Free Research)
This quick Flash presentation gives us an overview of Network Boost, a turn-key networking solution that offers application acceleration tools that are focused on achieving performance objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Taking a Strategic Approach to Risk Management by TraceSecurity

December 28, 2012 - (Free Research)
This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more. 
(EGUIDE) READ ABSTRACT |

Ovum: Corporate eGRC update by RSA, The Security Division of EMC

December 01, 2010 - (Free Research)
This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future. 
(WHITE PAPER) READ ABSTRACT |

Securing and Controlling Sensitive Data in the Cloud by Trend Micro

December 31, 2012 - (Free Research)
This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

MDM Software: Benefits of Mobile Configuration Management by SearchSecurity.com

November 27, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution. 
(EGUIDE) READ ABSTRACT |

Achieve Network Visibility and Control with Firewall Traffic Classification by Palo Alto Networks

March 21, 2014 - (Free Research)
In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies. 
(WHITE PAPER) READ ABSTRACT |

ImageMC++ by Viking Software Solutions

ImageMC++ is a highly advanced solution designed to maximize the auto-adjudication of claims. The rapid availability of electronic image and data, coupled with extensive rules-base processes, accelerates the handling of those claims that do not immediately auto-adjudicate and improves the efficiency of customer service functions. 
(SOFTWARE PRODUCT)

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 19, 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Data stewardship program: Quality booster, but a hard step for many by SAP America, Inc.

December 07, 2012 - (Free Research)
Data stewards are central to the success of data governance programs. Without data stewards to facilitate the communications about data issues between IT and the business side, diverging data definitions, policies and quality controls can easily get out of control. This e-guide offers tips and best practices. 
(EGUIDE) READ ABSTRACT |

JBoss Enterprise BRMS Data Sheet by Red Hat

July 20, 2012 - (Free Research)
<p>The JBoss Enterprise BRMS platform combines business rules, business process management (BPM), and complex event processing (CEP) in a single open source distribution. Read this data sheet to learn how the the unique features of JBoss' enterprise BRMS platform can benefit your organization.</p> 
(DATA SHEET) READ ABSTRACT |

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats by ComputerWeekly.com

September 05, 2011 - (Free Research)
The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues. 
(IT BRIEFING) READ ABSTRACT |

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow by Sendmail, Inc.

October 2008 - (Free Research)
This white paper examines the architecture limitations prevalent in today's large-enterprise email networks. 
(WHITE PAPER) READ ABSTRACT |

IT Decision Checklist: SIMs and Log Management by LogLogic, Inc.

January 2010 - (Free Research)
In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs. 
(EGUIDE) READ ABSTRACT |

JRules 6.0 - Putting Rules That Define The Business Back Into The Hands of The Business by ILOG, an IBM Company

May 2008 - (Free Research)
ILOG's Business Rules Management System, or JRules, provides a full function business rule management system that enables all business rules to be externalized. This allows the business to develop the rules directly, ensuring the rules accurately reflect the business policies. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Effective Network Access Control by Bradford Networks

December 2011 - (Free Research)
There is often confusion between the functions and benefits of 802.1X and those of commercially available NAC solutions. Which is best for particular networks? View now to explore the fundamentals of 802.1X and NAC technologies and why both is often required to provide the level of security, control and visibility needed in today’s network. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Evolved Packet Core by Alcatel-Lucent

June 2009 - (Free Research)
This white paper provides a brief introduction to Evolved Packet Core - a new mobile core for LTE. Key concepts and functional elements are outlined, as well as key changes in LTE requirements imposed on the Evolved Packet Core, and the deployment challenges one can expect to encounter. 
(WHITE PAPER) READ ABSTRACT |

Put an end to mainframe scripting with policy-driven IBM automation by IBM

April 2013 - (Free Research)
Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation. 
(WHITE PAPER) READ ABSTRACT |

Expert Strategies: How to Adapt to Social Media While Making Sure You Stay Compliant by Bloomberg

November 2013 - (Free Research)
In this expert white paper, gain insight on how to successfully keep compliant while protecting your business from the potential risks associated with using social media as a business tool. 
(WHITE PAPER) READ ABSTRACT |

Storage Management for the Cloud by IBM

February 2014 - (Free Research)
In this webcast, industry insider Mike Griese examines the features and functions of a next generation storage resource management application designed to address cloud storage management challenges. 
(WEBCAST) READ ABSTRACT |

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts