All resources sponsored by:

Absolute Software

1 - 25 of 34 Matches
How To Approach Mobile Healthcare Security And Data Breaches
sponsored by Absolute Software
EGUIDE:In this e-guide, industry expert Reda Chouffani presents 7 best practices for protecting mHealth data from breach. Also inside, explore how you can prepare for the aftermath of a breach.
Posted: 26 May 2015 | Published: 29 Apr 2015
Get This Now


3 Capabilities Found Within a Solid ITSM Strategy
sponsored by Absolute Software
VIDEO:This brief video highlights technologies that enable ITSM approaches based on practices defined within the ITIL. Tune in and learn the capabilities of a solid ITSM plan.
Posted: 08 May 2015 | Premiered: 08 May 2015
Get This Now


How to Leverage Mobile Management
sponsored by Absolute Software
WEBCAST:This brief webcast explores ways to leverage management for your employees' enterprised-enabled mobile devices. Tune in to learn about employee preferences for mobile technology as well.
Posted: 08 May 2015 | Premiered: May 8, 2015
Get This Now


Computer Network Management Made Easy
sponsored by Absolute Software
WEBCAST:This brief featured webcast highlights the burden of operating computer networks on a single platform. Use this resource to discover which technologies will enable you to manage both PCs and Macs easily from a single interface, as well as collect data regardless of device type.
Posted: 07 May 2015 | Premiered: May 7, 2015
Get This Now


Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST:This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015
Get This Now


CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST:This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014
Get This Now


Turning IT into a Profit Center
sponsored by Absolute Software
WEBCAST:This webinar emphasizes the importance of committing to "green" practices for businesses. Discover how to implement a power management policy that can automatically reduce energy use, saving $25 to 75$ per computer year.
Posted: 07 May 2015 | Premiered: May 7, 2015
Get This Now


Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST:The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014
Get This Now


Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST:This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014
Get This Now


Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST:Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014
Get This Now


Five Design Principles of an Effective Endpoint Security Strategy
sponsored by Absolute Software
WEBCAST:Access this webinar and learn about zero-day malware and other alarming virtual pests that pose a threat to organizations. Uncover the five design principals, by way of Forrester Research, that indicate an effective endpoint strategy.
Posted: 06 May 2015 | Premiered: Sep 17, 2014
Get This Now


Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER:This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015
Get This Now


Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST:This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014
Get This Now


When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST:Join Jeff Pelot, CIO at Denver Health, for a QA&A session on data security in healthcare organizations, how to stay on top of regulations, remain compliant, and how to prove that patient data on mobile devices is not at risk.
Posted: 04 May 2015 | Premiered: Feb 18, 2015
Get This Now


A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute Software
WHITE PAPER:This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 04 May 2015 | Published: 13 Nov 2014
Get This Now


Top 10 Data Security Tips to Mitigate Threats
sponsored by Absolute Software
WHITE PAPER:This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.
Posted: 01 May 2015 | Published: 30 Oct 2014
Get This Now


uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER:In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014
Get This Now


Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST:This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015
Get This Now


Enterprise Mobility: Security Strategies and Challenges
sponsored by Absolute Software
WEBCAST:In this webcast, you will uncover the top enterpise mobility challenges today.  View now to learn the four phases of BYOD to strengthen your security strategy and discover tips and best practices to minimize data loss risk.
Posted: 01 May 2015 | Premiered: Jan 2, 2014
Get This Now


The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER:This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014
Get This Now


Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER:In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015
Get This Now


Taking Strategic Action for Mobile Endpoint Management
sponsored by Absolute Software
WHITE PAPER:In this white paper, find five steps to creating a proactive, comprehensive endpoint management strategy.
Posted: 30 Apr 2015 | Published: 25 Apr 2014
Get This Now


Critical Capabilities for Client Management Tools
sponsored by Absolute Software
WHITE PAPER:This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 30 Apr 2015 | Published: 13 Jun 2014
Get This Now


Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT:Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014
Get This Now


Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER:Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement