Searching all of TechTarget| 50,329 results for "control"


News Feb 16, 2015

Hybrid cloud command and control

Expectations set by the public cloud around self-service and speed of deployment are beginning to creep into the enterprise. In the early days of cloud, developers were so wowed -- and the controls around accessing... Continue Reading


By Brien Posey Get Started Mar 16, 2015

A first look at the Network Controller role

The Network Controller permits physical and virtual network infrastructure management, as well as configuring and managing firewall rules. Continue Reading


By James Denman Manage Dec 23, 2014

Change control tools keep change control regulated

Change control tools help to manage data and keep change controls in order. Continue Reading


By Jawad Akhtar Mar 30, 2015

How can Statistical Process Control prevent production disruptions?

The Statistical Process Control tool can help prevent disruptions to business processes by providing better visibility into various factors that affect logistics and supply chain functions. Continue Reading


By Brien Posey Get Started Mar 26, 2015

This PowerShell module takes control of NTFS permissions

One simple install of the File System Security PowerShell Module can help manage NTFS permissions for user access to folders. Continue Reading


By Kevin Beaver Problem Solve Mar 25, 2015

Which controls can prevent multifunction printer security risks?

Hackers are infiltrating the enterprise through multifunction printers. Expert Kevin Beaver explains how to mitigate the threat and improve printer security. Continue Reading


By Clive Longbottom Evaluate Mar 18, 2015

Outsource IT support without losing control

Secure a highly available IT platform by ensuring you have the best data center support. Without precautions, you may suffer from greedy resellers and vendors. Continue Reading


By Nick Lewis Manage Mar 11, 2015

How can outdated ActiveX controls be blocked?

Outdated ActiveX controls can pose serious security risks. Enterprise threats expert Nick Lewis discusses how to block them in the enterprise. Continue Reading


By Dan Sullivan Get Started Mar 10, 2015

Tighten app control and manage identities with EMM

EMM may be the key to balancing personal privacy and business control. Discover important elements of a BYOD policy and new ways to control apps. Continue Reading


By David Linthicum Evaluate Mar 09, 2015

Where does IT privacy end and government control begin?

Cloud and IT security is already a hot-button issue. And now, U.S. law enforcement is looking for an easier path to search remote computers. Continue Reading