IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


Web Security: Revenge of the Vuln
sponsored by White Hat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Risk I/O Explainer Video
sponsored by Risk IO
WEBCAST: Download this exclusive video now to learn about a vulnerability management solution that will reveal your system vulnerabilities, identify those most at risk, show you exactly what you need to fix, and much more.
Posted: 26 Jan 2015 | Premiered: Jan 15, 2014

Risk IO

Thrive, Survive or Perish - Compute Economics
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how a mix of tools, such as converged infrastructure, and techniques, like maintenance task automation, frees your IT staff to pursue web and app development and deployment.
Posted: 23 Jan 2015 | Premiered: Oct 22, 2014

Hewlett-Packard Company

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

Bypassing Security Policies using Insufficient Authorization
sponsored by White Hat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 14 Apr 2015 | Premiered: Apr 14, 2015

White Hat Security

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

Choosing a Safe and Secure Service Delivery Platform
sponsored by Citrix
WEBCAST: Graham Melville, Senior Director, Product Marketing, NetScaler introduces the new capabilities of NetScaler MobileStream technologies.
Posted: 25 Mar 2015 | Premiered: May 6, 2014

Citrix

Credit Union of Colorado Customer Testimonial
sponsored by CommVault
WEBCAST: This webcast to examines the management solution they decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

CommVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement