IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Internet Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Internet Usage Policies Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Protect Your Enterprise with Security Monitoring
sponsored by Hewlett-Packard Limited
VIDEO: This brief video introduces a security monitoring system that effectively detects and stops risks.
Posted: 06 Apr 2015 | Premiered: 16 May 2014

Hewlett-Packard Limited

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Understanding Today's Information Security Threats
sponsored by Dell SecureWorks
VIDEO: This video can help you understand what information security threats your organization faces and how you can best combat them.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

Dell SecureWorks

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Redefining Enterprise Storage Management with the Cloud
sponsored by Nimble Storage
WEBCAST: In this webcast, Founder and Chief Scientist of DeepStorage Howard Marks analyzes current storage management capabilities in light of the emergence of flash storage, and leads a discussion with two customers about their experiences utilizing one storage management platform for automated support and predictive analytics.
Posted: 06 May 2015 | Premiered: Apr 17, 2015

Nimble Storage

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Comprehensive Virtualization Administration in One Place
sponsored by Tintri
WEBCAST: This video explores the features of an administrative portal for virtual environments to help you discover what tools you need to better administer your own.
Posted: 29 Jun 2015 | Premiered: Jun 29, 2015

Tintri

High Performance Graphics for Virtual Desktops
sponsored by NVIDIA/VMware
VIDEO: Graphics-rich apps are more popular than ever—but they require better VDI. Learn about the best offerings on the market.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement