IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Multimedia (View All Report Types)
 
Accelerating Data Center Modernization and Your Business
sponsored by Hewlett Packard Enterprise
VIDEO: Tune into this video to receive best-practice insights for modernizing your data center—from updating core applications to jump-starting big data analytics to cloud migration. Discover how to accelerate the delivery of IT services by implementing high-performance computing infrastructure, and more.
Posted: 09 Dec 2016 | Premiered: 09 Dec 2016

Hewlett Packard Enterprise

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Evaluating Red Hat Virtualization
sponsored by Red Hat
SOFTWARE DEMO: Is your enterprise ready to securely and confidently virtualize mission-critical applications, while gaining unparalleled performance and scalability? Take advantage of this free trial of Red Hat Virtualization now to evaluate its compatibility with your organization.
Posted: 24 Jan 2017 | Premiered: 24 Jan 2017

Red Hat

5 Traits of an Intelligence-Driven Security Operation Center
sponsored by Intel Security
WEBCAST: Understand the key challenges of traditional SOCs and find out what security leaders must do to build or mature an SOC.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

SaaS Vendor: Performance Most Critical Storage Requirement
sponsored by NetApp SolidFire
VIDEO: The ability to support its growing product line and customer base were top considerations when choosing a solution.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp SolidFire

Consolidate File Transfer Activity
sponsored by IBM
WEBCAST: Learn how IBM Sterling File Gateway provides a file transfer solution that's as powerful as it is easy to use.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Scalable and Sustainable Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to evolve your endpoint security to outsmart attackers, respond faster and drive efficiency.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Capabilities for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Compare critical capabilities across Security Information and Event Management vendors to choose the best SIEM solution.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

How High-Performance Storage Drives Competitive Advantage
sponsored by NetApp SolidFire
VIDEO: A managed backup provider describes how its solution lets it scale linearly and segment clouds the way it wants to.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp SolidFire

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement