IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security PoliciesMultimedia (View All Report Types)
 
Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: View this webcast to find out how you can create effective application security in the enterprise. Learn more about eliminating some of the most prevalent threats to your businesses by tuning in to this video now.
Posted: 11 Mar 2013 | Premiered: Mar 11, 2013

IBM

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Guidelines for Affordable Disaster Recovery in the Cloud
sponsored by SearchCloudComputing.com
VIRTUAL ENVIRONMENT: This multimedia classroom looks at the methods, benefits, and challenges to conducting disaster recovery in the cloud.
Posted: 15 Mar 2013 | Premiered: 19 Mar 2013

SearchCloudComputing.com

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AlienVault

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement