<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Policy</title> <atom:link href="https://www.iphere.com/tag/policy/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Building An Information Security Policy Part 3: Logical And Physical Design</title><link>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design#comments</comments> <pubDate>Thu, 20 Mar 2014 02:19:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Design]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Logical]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Physical]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</guid> <description><![CDATA[Careful crafting of the logical and physical aspects of a network is essential for an effective security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 2: Hardware and Software</title><link>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software#comments</comments> <pubDate>Fri, 28 Feb 2014 02:14:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Hardware]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</guid> <description><![CDATA[Here&#8217;s how to select the right network device hardware and software to support your security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building an Information Security Policy Part 1: Network Devices</title><link>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices#comments</comments> <pubDate>Wed, 19 Feb 2014 20:13:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Devices]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-1-network-devices</guid> <description><![CDATA[An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Secure Networks: How To Develop An Information Security Policy</title><link>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy</link> <comments>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy#comments</comments> <pubDate>Thu, 23 Jan 2014 20:13:23 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Develop]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy</guid> <description><![CDATA[A security policy is the foundation of a secure network, but it must balance security with business needs. Here are some guidelines for successful security policy development. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Tufin Updates Security Policy Management Software</title><link>https://www.iphere.com/tufin-updates-security-policy-management-software</link> <comments>https://www.iphere.com/tufin-updates-security-policy-management-software#comments</comments> <pubDate>Fri, 25 Oct 2013 20:25:28 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <category><![CDATA[Tufin]]></category> <category><![CDATA[Updates]]></category> <guid
isPermaLink="false">http://www.iphere.com/tufin-updates-security-policy-management-software</guid> <description><![CDATA[Update expands firewall support; NetMotion offers Locality via the cloud; Zadara boosts cloud storage; Brocade adds MAPs for SANs. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/tufin-updates-security-policy-management-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>What Office 2013&#8242;s draconian licensing policy really means for you</title><link>https://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you-2</link> <comments>https://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you-2#comments</comments> <pubDate>Thu, 09 May 2013 14:13:49 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA['Office]]></category> <category><![CDATA[2013's]]></category> <category><![CDATA[draconian]]></category> <category><![CDATA[Licensing]]></category> <category><![CDATA[Means]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Really]]></category> <guid
isPermaLink="false">http://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you-2</guid> <description><![CDATA[Microsoft might be selling two versions of its Office suite, but its licensing policies suggest the company is not only trying to thwart software piracy, but also drive customers away from Office 2013 and over to the Office 365 subscription model.  First, a little background. Purchasing Office 2013 only provides a license for a single PC [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>What Office 2013&#8242;s draconian licensing policy really means for you</title><link>https://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you</link> <comments>https://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you#comments</comments> <pubDate>Tue, 19 Feb 2013 02:19:02 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA['Office]]></category> <category><![CDATA[2013's]]></category> <category><![CDATA[draconian]]></category> <category><![CDATA[Licensing]]></category> <category><![CDATA[Means]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Really]]></category> <guid
isPermaLink="false">http://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you</guid> <description><![CDATA[Microsoft might be selling two versions of its Office suite, but its licensing policies suggest the company is not only trying to thwart software piracy, but also drive customers away from Office 2013 and over to the Office 365 subscription model.  First, a little background. Purchasing Office 2013 only provides a license for a single PC [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/what-office-2013s-draconian-licensing-policy-really-means-for-you/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>McAfee Launches Real-Time Security Policy Software</title><link>https://www.iphere.com/mcafee-launches-real-time-security-policy-software</link> <comments>https://www.iphere.com/mcafee-launches-real-time-security-policy-software#comments</comments> <pubDate>Sat, 16 Feb 2013 08:13:49 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Launches]]></category> <category><![CDATA[McAfee]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[RealTime]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <guid
isPermaLink="false">http://www.iphere.com/mcafee-launches-real-time-security-policy-software</guid> <description><![CDATA[News roundup: McAfee connects ePolicy Orchestrator to Enterprise Security Manager; Arista Launches Data Analyzer; Zscaler goes big with Security Cloud analytics; Anturis unveils beta IT monitoring tool Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/mcafee-launches-real-time-security-policy-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Tufin Tracks Applications for Better Firewall Policy Management</title><link>https://www.iphere.com/tufin-tracks-applications-for-better-firewall-policy-management</link> <comments>https://www.iphere.com/tufin-tracks-applications-for-better-firewall-policy-management#comments</comments> <pubDate>Wed, 19 Sep 2012 20:12:46 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Applications]]></category> <category><![CDATA[Better]]></category> <category><![CDATA[Firewall]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Tracks]]></category> <category><![CDATA[Tufin]]></category> <guid
isPermaLink="false">http://www.iphere.com/tufin-tracks-applications-for-better-firewall-policy-management</guid> <description><![CDATA[SecureApp is designed to help administrators keep up with enterprise app connectivity changes based on business requirements. Learn more about the tool, and how it can affect firewall policy management. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/tufin-tracks-applications-for-better-firewall-policy-management/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The Hardest Part of BYOD Management? Policy</title><link>https://www.iphere.com/the-hardest-part-of-byod-management-policy</link> <comments>https://www.iphere.com/the-hardest-part-of-byod-management-policy#comments</comments> <pubDate>Tue, 28 Aug 2012 14:12:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Hardest]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-hardest-part-of-byod-management-policy</guid> <description><![CDATA[Sure, BYOD is a hot topic&#8211;but you don&#8217;t have to allow it. If you do, though, here&#8217;s why determining your policy should be the first step to BYOD management. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-hardest-part-of-byod-management-policy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>