IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Building a Solid Foundation for Service Management
sponsored by ServiceNow
VIDEO: In this webcast, Andy Garrett, Head of IT Service Development at Travis Perkins Plc, explains how they modernized their ITSM strategy. Tune in to discover the key factors that set them up for success.
Posted: 01 Mar 2016 | Premiered: 24 Nov 2015

ServiceNow

Radically Faster Application Delivery and Unified Management
sponsored by VMware
WEBCAST: Discover how you can optimize virtual desktop and application environments with an application lifecycle management approach that simplifies the creation, deployment, and management of applications. You'll examine the three step approach to improve application delivery and user environment management.
Posted: 19 May 2016 | Premiered: May 19, 2016

VMware

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

Hyper Convergence in the Era of Always-On Business
sponsored by HPE and Veeam
WEBCAST: In this expert webcast, discover why hyper convergence remains such a big deal for virtualized environments—and separate fact from vendor hype. Tune in to examine how hyper convergence-based data center modernization will help you set the stage for high availability and rapid recoverability.
Posted: 06 Apr 2016 | Premiered: Mar 23, 2016

HPE and Veeam

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

Transforming Your Data-Driven IT Organization
sponsored by Windsor Group
VIDEO: Tune into this video to learn how to transform your data-driven organization and service delivery by leveraging the market insight and expertise of one ITSM provider. Learn how to determine the best ITSM sourcing strategy for you, and transform your IT operations with an alternative delivery and market pricing model evaluation.
Posted: 16 May 2016 | Premiered: 16 May 2016

Windsor Group

Zero-Day Attacks: Why you need a Deeper Level of Inspection
sponsored by Check Point Software Technologies Ltd.
VIDEO: Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.
Posted: 25 Mar 2016 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

How the HC380 is Changing the Hyper-Converged Market
sponsored by Hewlett Packard Enterprise
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 11 May 2016 | Premiered: 11 May 2016

Hewlett Packard Enterprise

Internet of Things Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.
Posted: 26 Apr 2016 | Premiered: 01 May 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement