Whitepaper Library
 

group policy

Results 1 - 25 of 27Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Riverbed     Published Date: Jul 21, 2015
This is a riverbed white paper explains how the flexibility and cost benefits of Internet connectivity lead to a hybrid network and provides best practices to overcoming the challenges introduced. This piece focuses on the ability to control such deployments at scale, and covers our application centric approach, covering our network services in depth (app groups, global policy management, QoS, Path selection, etc.)
Tags : 
hybrid enterprise, cost and flexibility, internet connectivity, hybrid network, network services
    
Riverbed
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and it’s getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : 
netiq, change management, microsoft group policy, compliance auditing, recovery
    
NetIQ
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore, policy management
    
ScriptLogic
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: Dell Software     Published Date: Jul 18, 2012
Paper: Make Group Policies Do Mor
Tags : 
group policy, white paper, technology, customer, desktop, configuration, gpos, wmi
    
Dell Software
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration
    
Centrify Corporation
Published By: HP and Intel     Published Date: Aug 13, 2012
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization -- and support of solid-state drives (SSDs). Learn how this combination is a thoughtful approach that can deliver significant value.
Tags : 
enterprise strategy group, hp 3par storage, optimizing i/o service levels, adaptive software, ssds, solid-state drives, data center
    
HP and Intel
Published By: ScriptLogic     Published Date: Aug 23, 2011
Since its introduction in 2000, Group Policy has been a hit. Tens of thousands of organizations worldwide use it to create more consistent desktops for their users, to deploy software packages, to secure their computers, and more.
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria, ip networks, local area networking
    
ScriptLogic
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how to successfully extend your deployment of Group Policy to your servers by implementing end-to-end management of this pervasive technology, including advanced offline management and real-time monitoring of authorized and unauthorized changes.
Tags : 
group policy, policy management, security management, servers, server management, netiq, net iq, infrastructure, network management
    
NetIQ Corporation
Published By: ScriptLogic     Published Date: Aug 18, 2011
One of the biggest complexities in desktop management is the fact that no organization has a single desktop configuration and need. There should and there is a better way. Download this whitepaper to find out more.
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria, ip networks, local area networking
    
ScriptLogic
Published By: ScriptLogic     Published Date: Aug 23, 2011
Free Whitepaper | The Definitive Guide to Logon Script Replacement
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria, ip networks, local area networking
    
ScriptLogic
Published By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator, secure copy, service explorer, security explorer, enterprise security reporter, scripting, drive mapping, printer deployment, roaming profiles, outlook profiles, group policy management, server management, ntfs permissions
    
ScriptLogic
Published By: Integrated Research     Published Date: Apr 13, 2011
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.
Tags : 
energy management software, power management, pc power management, power management software, computer power management, green technology, how to save electricity, save power, electricity saving tips, desktop power management, sustainable business practices, saving electricity, reduce carbon emissions, reduce electricity consumption, powerminder, energy management systems, verdiem, power saving software, energy efficiency, nightwatchman
    
Integrated Research
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization and more. Learn how this combination is a thoughtful approach that can deliver.
Tags : 
hp 3par, optimization, io service levels, optimizing, data center
    
Sponsored by HP and Intel® Xeon® processors
Previous   1 2    Next    
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.