IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Why a Cultural Shift Is Needed for Proper Treatment of Data
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this video, you will discover a discussion with Sacha Stuparich, Practice Partner for Financial Services, Communications, & Media at Hewlett-Packard Enterprise, in which he examines the changing use of data in the financial services industry.
Posted: 21 Mar 2016 | Premiered: Nov 18, 2015

Hewlett-Packard Enterprise

Bimodal IT Best Practices
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: Bimodal IT is an approach in which a company operates two tiers of IT management -- one focused on "keeping the lights on" and the other focused on experimentation and speed to drive business goals. This Classroom explores emerging best practices around bimodal IT.
Posted: 17 Feb 2016 | Premiered: 16 Feb 2016

TOPICS:  IT Management
SearchCIO.com

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

How Box Platform Helps Businesses Build Better Apps
sponsored by Box
WEBCAST: Discover how to build better apps that ease secure content sharing within and outside of your enterprise. Tune in to overcome cumbersome content sharing, and discover how content Platform-as-a-Service can transform your organization—from outside users to IT.
Posted: 16 May 2016 | Premiered: May 16, 2016

Box

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert

Simplify IT Management, Simplify Your Life
sponsored by Dell, Inc. and Intel®
VIDEO: Watch this light-hearted video to find out what happens when a new IT guy joins an office that uses the combination of Dell, Citrix, and Intel technology to power its organizations desktops and see how this technology landscape impacts the IT department.
Posted: 21 Jan 2016 | Premiered: 21 Jan 2016

Dell, Inc. and Intel®

New IT Technologies Transform Traditional Business Models
sponsored by Hewlett-Packard Enterprise
VIDEO: Andrew Dare, Chief Technologist of Financial Services UK&I at Hewlett Packard Enterprise, examines the important role emerging technologies play in transforming traditional IT setups in financial institutions. Tune in to take a close look at how the card payment space is changing.
Posted: 21 Mar 2016 | Premiered: 12 Nov 2015

Hewlett-Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement