IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use PolicyMultimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


How to Stay Competitive in the Evolving ITSM Landscape
sponsored by FrontRange Solutions Inc.
VIDEO: In this video, discover how IT service management's competitive landscape is evolving—and not just focusing on solely the cloud or an on-premise environment. A vendor who provides a hybrid solution will be the one that comes out on top in the end, due to flexibility and scalability.
Posted: 22 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

RoadChef have found HP to be an honest partner
sponsored by Hewlett-Packard Limited
VIDEO: Honesty is one of the most important traits that any vendor can provide to its customer—even when the topics are not so soothing to the ear. Check out the following video case study to hear why Roadchef fully confides in the honesty of HP.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Hewlett-Packard Limited

How to Drive User Adoption in New Technology Deployment
sponsored by Code42
WEBCAST: How can you successfully deploy a new technology and ensure users are on board? In this on-demand webinar, Paul Glen, author of "The Geek Leader's Handbook," delves into the interpersonal issues IT faces when implementing a new technology and shares how user adoption is the key to a successful deployment.
Posted: 07 Jul 2014 | Premiered: Jul 3, 2014

Code42

Figuring out FIDO
sponsored by HID
WEBCAST: This expert webcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO alliance.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

How Conventional Security Tools Expose Modern Data Centers to Cyber Threats
sponsored by CDW Corporation
WEBCAST: This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.
Posted: 21 Jul 2014 | Premiered: Jun 17, 2014

CDW Corporation

Stay in Control of Critical Data with GFI Cloud
sponsored by GFI Cloud
VIDEO: Access this video for a product tour of a solution that offers IT management, monitoring, and security capabilities.
Posted: 09 Jul 2014 | Premiered: 10 Oct 2013

GFI Cloud

Video: EMC Hybrid Cloud Solution - The Foundation of Hybrid IT
sponsored by EMC Corporation
WEBCAST: Join Peter Cutts, VP & GM, EMC Cloud & EUC Solutions, to learn more about EMC's innovative Hybrid Cloud Solution - delivering self-service resources from private and public clouds.
Posted: 19 Aug 2014 | Premiered: Aug 19, 2014

EMC Corporation

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement