Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Controlling the Assault of Non-solicited Pornography and Marketing Act of 2003

RSS Feed    Add to Google    Add to My Yahoo!
Controlling the Assault of Non-solicited Pornography and Marketing Act of 2003 Multimedia (View All Report Types)
 
Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

Business Information University: A CIO's Guide to Launching a Big Data Analytics Strategy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom addresses the challenges enterprises face as they attempt to centralize the BI strategy and the tools and methodologies that are addressing these challenges.
Posted: 25 Apr 2013 | Premiered: 16 Mar 2013

SearchCIO.com

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Moving Email Management to the Cloud: Understanding IT Transitions
sponsored by Mimecast
WEBCAST: During this Mimecast webinar, you'll gain an understanding of what to look for in a cloud services provider, learn how to identify your own IT transitions points related to their specific email environment, uncover how to address any potential internal security questions when transitioning to a cloud-based service, and more!
Posted: 13 Aug 2010 | Premiered: Aug 13, 2010

Mimecast

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World
sponsored by Mainline Information Systems
WEBCAST: Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.
Posted: 31 May 2011 | Premiered: May 26, 2011

Mainline Information Systems

Why Cloud-Based Security and Archiving Make Sense
sponsored by Google Postini
WEBCAST: Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
Posted: 03 Jun 2010 | Premiered: Jun 3, 2010

Google Postini

Worry-Free Business Security Services
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement