RSS feed Get our RSS feed

News by Topic

policy based

Results 51 - 52 of 52Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : enterprise, policy-based, infrastructure, cloud, visibility, scalability
     Cisco
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
Start   Previous    1 2 3     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics