IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use PolicyMultimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


Transforming Into Senior Digital Business Executives
sponsored by Gartner
WEBCAST: Tune in to this informative webcast to learn how you can make the most out of your role as CIO or IT manager and refocus your efforts on adding real business value to you enterprise. Click on the link and stream this informative webcast from the experts at Gartner to find out more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014

Gartner

Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security
sponsored by Imperva
WEBCAST: This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.
Posted: 15 Jul 2014 | Premiered: Jul 15, 2014

Imperva

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

A Hybrid ITSM Solution Designed to Meet Your Needs
sponsored by FrontRange Solutions Inc.
VIDEO: This video explains the flexible, hybrid FrontRange solution that can solve your ITSM needs. Watch now to learn how the automated service delivery lifecycle workflow can save you time and money.
Posted: 29 Jul 2014 | Premiered: 06 Feb 2013

FrontRange Solutions Inc.

Balancing Risk with Agility: Best Practices for Securing Public Cloud Deployments
sponsored by Trend Micro
PODCAST: This exclusive webcast will give you key advice for ensuring the security of your data and applications in the cloud.
Posted: 04 Jun 2014 | Premiered: May 30, 2014

Trend Micro

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy
sponsored by AlienVault
WEBCAST: This webcast provides insight into rethinking vulnerability management. It also reviews the common challenges of vulnerability management and ways to overcome those challenges.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

AlienVault

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement