policy enforcement

Results 1 - 23 of 23Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017

Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.

Tags : centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
By: Symantec.cloud     Published Date: Mar 02, 2011

The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.

Tags : symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop
    
By: Venafi     Published Date: Mar 26, 2015

Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.

Tags : digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
By: Venafi     Published Date: Mar 26, 2015

We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.

Tags : outages, digital certificates, encryption, authentication, surveillance, automation
    
By: CA Technologies EMEA     Published Date: Aug 07, 2017

Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.

Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
    
By: Cisco     Published Date: Jun 29, 2015

Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.

Tags : csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation, network architecture
    
By: Clearswift     Published Date: Jun 09, 2008

This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.

Tags : clearswift, network security, internet security, web security, anti spam
    
By: McAfee     Published Date: Feb 06, 2013

Insight and control to secure your dynamic cloud environment at every infrastructure layer

Tags : cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement, application security, data security, security compliance
    
By: Aerohive     Published Date: Feb 06, 2008

Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.

Tags : business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive
    
By: Lumension     Published Date: Nov 19, 2010

Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.

Tags : lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
By: Datacastle     Published Date: Jul 09, 2010

How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.

Tags : datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection
    
By: Nemx Software Corporation     Published Date: Oct 23, 2007

Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.

Tags : email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
By: BlackBerry     Published Date: Dec 22, 2009

Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.

Tags : blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
By: Symantec     Published Date: Jul 11, 2017

Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.

Tags : secure web gateway, web application, cloud application, encryption, web threats
    
By: Cisco     Published Date: Apr 08, 2015

Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.

Tags : next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
By: Cisco     Published Date: Jan 15, 2015

Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.

Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
    
By: AirDefense     Published Date: Apr 24, 2007

This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.

Tags : wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
By: C2C Systems, Inc.     Published Date: Mar 15, 2007

Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.

Tags : email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
By: Nevis Networks     Published Date: Sep 04, 2007

While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.

Tags : security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis
    
By: Nevis Networks     Published Date: Sep 04, 2007

The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.

Tags : lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
By: IBM Corporation     Published Date: Jun 09, 2011

This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.

Tags : ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
By: IBM     Published Date: Apr 20, 2017

Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.

Tags : auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization