IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed    Add to Google    Add to My Yahoo!
AUP Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Stop Running Around for IT
sponsored by Dell, Inc. and Intel®
VIDEO: This humorous video shows how one IT guy made his job more efficient with cloud client solutions from Dell, Citrix, and Intel technologies. Watch now and you'll learn how this combination of technologies allowed him to simplify desktop management and improve security capabilities.
Posted: 20 Jan 2016 | Premiered: 20 Jan 2016

Dell, Inc. and Intel®

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

VoIP: Real Deployment Stories from the Field
sponsored by 8x8, Inc.
WEBCAST: This webcast features a seasoned VoIP veteran with real-world experience from thousands of successful deployments, detailing how VoIP-based technology has changed, where it is going, and where it might take companies like yours tomorrow.
Posted: 21 Dec 2015 | Premiered: May 22, 2015

8x8, Inc.

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Reimagining Security: A New Way to Think
sponsored by IBM
VIDEO: Access this brief video to learn about one security platform that offers a multi-layered approach to security. Discover how you can optimize your current investment in IT security, stop advanced threats, protect your critical assets, and safeguard cloud and mobile technology.
Posted: 01 Dec 2015 | Premiered: 07 Apr 2015

IBM

Australia Department of Prime Minister & Cabinet on G20 Tech
sponsored by Dimension Data
VIDEO: In a world first, the 2014 G20 used cloud for secure networking and virtual desktop. Learn how a new benchmark was set.
Posted: 08 Jun 2015 | Premiered: 08 Jun 2015

TOPICS:  IT Management
Dimension Data

A Massively Scalable Approach to Network Security
sponsored by Dell
WEBCAST: This tech brief offers a better approach: an innovative scale-out next-generation firewall architecture that can address today's needs by providing: Better performance Increased resiliency Lower total cost of ownership (TCO)
Posted: 01 Dec 2015 | Premiered: Dec 1, 2015

TOPICS:  IT Management
Dell

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement