IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Internet Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Internet Usage Policies Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

What Are You Missing from Your 2016 Security Budget?
sponsored by OptioLabs
WEBCAST: Access this webcast to learn how to get the security you need while still balancing your budget.
Posted: 14 Dec 2015 | Premiered: Nov 23, 2015

OptioLabs

Cut Your IT Backlog by 50% in Minutes
sponsored by Intuit
WEBCAST: In this webcast, learn about the opportunities that cutting your IT backlog presents and how you can do it quickly. Explore the underlying issues behind shadow IT and IT backlogs, as well as the steps to implement a software option that can streamline IT.
Posted: 16 Dec 2015 | Premiered: Dec 16, 2015

Intuit

Reimagining Security: A New Way to Think
sponsored by IBM
VIDEO: Access this brief video to learn about one security platform that offers a multi-layered approach to security. Discover how you can optimize your current investment in IT security, stop advanced threats, protect your critical assets, and safeguard cloud and mobile technology.
Posted: 01 Dec 2015 | Premiered: 07 Apr 2015

IBM

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015

IBM

Case Study: How Visa Tailored Services With Analytics
sponsored by SAS
WEBCAST: Credit card fraud is always evolving. Find out how Visa used analytics to minimize invalid transactions.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Interactive Tool: Business Analytics Maturity Assessment
sponsored by SAS
WEBCAST: Discover the strengths and weaknesses of your organization's analytics with this five minute test.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Moving to the Future: Data Center Development Model
sponsored by Dimension Data
VIDEO: Tech and business are changing fast. Learn to use your data center for better performance, access, savings and more.
Posted: 05 May 2015 | Premiered: 05 May 2015

TOPICS:  IT Management
Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement