Policy-Based Networking Reports

E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

TechTarget Security

A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER: This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004

Raritan Inc.

Cashing in on Policy-based Power Management
sponsored by Intel
WHITE PAPER: In today’s ever-growing data centers, no one takes power for granted. There have been many reminders of the threats to power supplies— including catastrophic natural events, breakdowns in the power grid, and seasonal power shortages. This white paper describes how policy-based power management can reign in energy use and significantly cut costs.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

Intel

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by TechTarget Security
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

TechTarget Security

SDN technologies primer: Revolution or evolution in architecture?
sponsored by Enterasys
EGUIDE: While there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Enterasys

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM