IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

StarMobile

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Effective Data Protection for Your Virtual Environment
sponsored by IBM
VIDEO: This video discusses the capabilities of a strong virtual data protection system to demonstrate how you can best protect data in your virtual environment.
Posted: 09 Jul 2015 | Premiered: 08 Sep 2014

IBM

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Distil Networks 2015 Bad Bot Report: 5 High-Risk Lessons
sponsored by Distil Networks
WEBCAST: Distil Networks has produced IT Security's most in-depth analysis on the sources, types and sophistication levels of last year's bot attacks. Listen to this exclusive webcast to keep your organization safe.
Posted: 11 May 2015 | Premiered: May 15, 2015

Distil Networks

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by White Hat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement