All resources sponsored by:

Absolute Software

1 - 25 of 48 Matches
3 Capabilities Found Within a Solid ITSM Strategy
sponsored by Absolute Software
VIDEO:This brief video highlights technologies that enable ITSM approaches based on practices defined within the ITIL. Tune in and learn the capabilities of a solid ITSM plan.
Posted: 08 May 2015 | Premiered: 08 May 2015
Get This Now


How to Leverage Mobile Management
sponsored by Absolute Software
WEBCAST:This brief webcast explores ways to leverage management for your employees' enterprised-enabled mobile devices. Tune in to learn about employee preferences for mobile technology as well.
Posted: 08 May 2015 | Premiered: May 8, 2015
Get This Now


Computer Network Management Made Easy
sponsored by Absolute Software
WEBCAST:This brief featured webcast highlights the burden of operating computer networks on a single platform. Use this resource to discover which technologies will enable you to manage both PCs and Macs easily from a single interface, as well as collect data regardless of device type.
Posted: 07 May 2015 | Premiered: May 7, 2015
Get This Now


Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST:This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015
Get This Now


CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST:This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014
Get This Now


Turning IT into a Profit Center
sponsored by Absolute Software
WEBCAST:This webinar emphasizes the importance of committing to "green" practices for businesses. Discover how to implement a power management policy that can automatically reduce energy use, saving $25 to 75$ per computer year.
Posted: 07 May 2015 | Premiered: May 7, 2015
Get This Now


Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST:The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014
Get This Now


Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST:This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014
Get This Now


Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST:Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014
Get This Now


Five Design Principles of an Effective Endpoint Security Strategy
sponsored by Absolute Software
WEBCAST:Access this webinar and learn about zero-day malware and other alarming virtual pests that pose a threat to organizations. Uncover the five design principals, by way of Forrester Research, that indicate an effective endpoint strategy.
Posted: 06 May 2015 | Premiered: Sep 17, 2014
Get This Now


Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER:This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015
Get This Now


Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST:This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014
Get This Now


Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST:The additions of HITECH and OFR extend HIPAA's reach to business associates and partners. This webcast explores the consequences of a downstream violation and the penalties you will receive if a breach occurs. View now to learn why encryption isn't enough for your security and compliance strategy.
Posted: 05 May 2015 | Premiered: Oct 22, 2014
Get This Now


Compliance Penalties + Class Action Damages = Healthcare Budget Crisis
sponsored by Absolute Software
WEBCAST:Examines the cost of a breach in the healthcare sector and why you need to go beyond encryption to protect your organization. View this webcast now for strategies to limit the exposure of your organization to security risks.
Posted: 05 May 2015 | Premiered: Mar 19, 2014
Get This Now


When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST:Join Jeff Pelot, CIO at Denver Health, for a QA&A session on data security in healthcare organizations, how to stay on top of regulations, remain compliant, and how to prove that patient data on mobile devices is not at risk.
Posted: 04 May 2015 | Premiered: Feb 18, 2015
Get This Now


Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
WEBCAST:Find out about data breach trends and statistics, including the cost of a breach and common attack strategies, in this webcast. View now to learn the steps to take to mitigate and respond to a breach.
Posted: 04 May 2015 | Premiered: Jan 22, 2015
Get This Now


What You Should Do Today to Protect Endpoint Devices in Healthcare
sponsored by Absolute Software
WEBCAST:With only roughly 50% of healthcare endpoints being secure with encryption, it's obvious that healthcare security pros need to revamp strategies.  View this webcast to take an in-depth look at the current threat landscape for healthcare organizations how to protect endpoint devices using five design principles. Watch now to learn more.
Posted: 04 May 2015 | Premiered: Feb 2, 2015
Get This Now


A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute Software
WHITE PAPER:This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 04 May 2015 | Published: 13 Nov 2014
Get This Now


Top 10 Data Security Tips to Mitigate Threats
sponsored by Absolute Software
WHITE PAPER:This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.
Posted: 01 May 2015 | Published: 30 Oct 2014
Get This Now


uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER:In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014
Get This Now


Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST:This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015
Get This Now


Enterprise Mobility: Security Strategies and Challenges
sponsored by Absolute Software
WEBCAST:In this webcast, you will uncover the top enterpise mobility challenges today.  View now to learn the four phases of BYOD to strengthen your security strategy and discover tips and best practices to minimize data loss risk.
Posted: 01 May 2015 | Premiered: Jan 2, 2014
Get This Now


The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER:This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014
Get This Now


Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER:In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015
Get This Now


Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE:In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.
Posted: 30 Apr 2015 | Published: 11 Sep 2014
Get This Now


1 - 25 of 48 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement