Policy-Based Networking Software White Papers

(View All Report Types)
Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Next-Generation Firewalls (NGFWs)
sponsored by AlgoSec
WHITE PAPER: This paper will highlight tips to effectively implement next-generation firewalls and optimize policies so that you can enjoy the clear benefits without falling into overly complex, unmanageable and risky policy traps.
Posted: 27 Aug 2013 | Published: 31 Dec 2012

AlgoSec

Vendor Landscape: Virtual Backup Software
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to evaluate virtual backup software to end the arguing between virtual and backup admins. Read on to consider a solution to back up your virtual infrastructure, understand what's new in the virtual backup market, and determine which products are most appropriate for particular use-cases and scenarios.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Dell Software

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

MAXIMIZE THE VALUE OF YOUR APPLICATIONS WITH FUSION MIDDLEWARE
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores the challenges of operating multiple applications simultaneously. Find out how you can improve efficiency and reduce risk with a pre-integrated application infrastructure.
Posted: 02 Aug 2012 | Published: 01 Jun 2010

Oracle Corporation

The Application Migration Workbook
sponsored by Citrix Systems, Inc.
WHITE PAPER: Discover how to achieve pain-free application migrations in this essential workbook and guide. Read on to uncover key strategies and technologies that can simplify the process and lay the foundation for more effective application management.
Posted: 17 Jul 2012 | Published: 17 Jul 2012

Citrix Systems, Inc.

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Software-defined Storage: the overall benefits
sponsored by IBM
WHITE PAPER: This brief video cuts through some of the confusion surrounding SDS and tells you what to look for – and what to avoid – when choosing an SDS product.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

IBM

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Tasktop

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.