IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  


RSS Feed    Add to Google    Add to My Yahoo!
AUP Multimedia (View All Report Types)
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


Dell Quick Start Tool for Citrix XenDesktop
sponsored by Dell, Inc. and Intel®
WEBCAST: In this webcast, learn about a tool designed to allow an entire Citrix XenDesktop or XenApp platform to be deployed all from one console. Watch now to see a demonstration of how simple and fast it is to set up your desktop or application environment – in just four steps.
Posted: 21 Sep 2015 | Premiered: Aug 4, 2015

Dell, Inc. and Intel®

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

How to Optimize Your Legacy Data Center
sponsored by Hewlett Packard Enterprise & SUSE
WEBCAST: This webcast explores top considerations for migrating from inefficient, legacy environments in your data center to modern platforms. Tune in to learn how you can gain the most ROI and benefit from this transition.
Posted: 10 Nov 2015 | Premiered: Nov 3, 2015

Hewlett Packard Enterprise & SUSE

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Making "Things" Secure: Towards a Safer Internet of Things
sponsored by Symantec Corporation
WEBCAST: This webcast discusses different IoT applications and exposes how important security and reliability is when putting together an IoT system. Access now to see the top 10 vulnerabilities of IoT applications, including insecure network services, insufficient security configurability, and inefficient authentication, and learn how you can resolve them.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Citrix Clinical Mobile Workspace Demo
sponsored by Citrix
VIDEO: This short video makes the case for improving patient outcomes by enabling clinicians to be securely connected to all aspects of healthcare all the time.
Posted: 11 Nov 2015 | Premiered: 29 Aug 2014


Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data security.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc
Visit - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement