IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Hyperconverged Infrastructure for Remote Offices
sponsored by SimpliVity
WEBCAST: This webcast addresses ways that hyper-converged infrastructure can benefit your remote offices – having consistent application performance, fast reliable data protection, maximum WAM efficiency, and better use of IT staff. Download now to learn more and see a short demo of the system.
Posted: 19 Jul 2016 | Premiered: Nov 12, 2015

SimpliVity

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

Linking App Development to Hybrid Cloud Operations
sponsored by Embotics
WEBCAST: Learn about issues facing cloud application development today. Discover how IT can enable the high-speed, automated, highly interconnected nature of DevOps while at the same time ensuring proper controls.
Posted: 22 Aug 2016 | Premiered: Feb 29, 2016

Embotics

Top 5 IT Trends to Watch in 2016: Workspaces for Tomorrow
sponsored by Dimension Data
WEBCAST: Work has changed radically in the past decade. Learn what two leading experts say the next wave of changes will bring.
Posted: 12 May 2016 | Premiered: May 12, 2016

TOPICS:  IT Management
Dimension Data

Webinar: How Sunrise Health Region is Improving the Clinician Experience through Secure and Simple VDI
sponsored by Dell, Inc. and Intel®
WEBCAST: Sunrise Health Region found that their current infrastructure created long log-in times and multiple sign-in credentials from each endpoint they used daily. Gain insight into how their end users and IT benefited from a VDI approach and improved clinician access, workflow, and experience, increased staff mobility on any device, and more.
Posted: 27 Jul 2016 | Premiered: Jul 19, 2016

Dell, Inc. and Intel®

How Equinix Deploys an Effective Cloud-based SIEM
sponsored by Splunk
WEBCAST: Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

HPE Hyper Converged 380 "Your VM Vending Machine"
sponsored by Hewlett Packard Enterprise
VIDEO: This video dives into the benefits businesses can attain through deployment of a hyper-converged infrastructure.
Posted: 11 May 2016 | Premiered: 11 May 2016

Hewlett Packard Enterprise

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement