IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Internet Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Internet Usage PoliciesMultimedia (View All Report Types)
 
Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Get a Jumpstart on Desktop Virtualization and Take Control of BYOD
sponsored by VMware
WEBCAST: This webcast details how to keep your data secure and take control of BYOD and virtual desktops.
Posted: 04 Mar 2014 | Premiered: Mar 4, 2014

VMware

HP vs. Cisco – Which IT Management System Came Out on Top?
sponsored by HP and Intel
WEBCAST: Watch this webcast to find out which IT management system proved to be the better choice.
Posted: 04 Feb 2014 | Premiered: Sep 25, 2013

HP and Intel

Secure Your Apps, Docs and Devices in Minutes
sponsored by Fiberlink
WEBCAST: In this webcast, discover a single mobile management and security platform that ensures data protection and maintains compliance across all devices used for business.
Posted: 28 Feb 2014 | Premiered: Dec 6, 2013

Fiberlink

UK MSP: Winning and Retaining Customers More Effectively with Autotask
sponsored by Autotask Corporation
VIDEO: This brief video covers how to make your organization accountable for IT.
Posted: 29 Jan 2014 | Premiered: 29 Jan 2014

Autotask Corporation

HP's Industrialised Delivery System
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast explores how your organization can achieve the true scale of outsourcing with industrialized delivery.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Rethinking Enterprise Mobility: The Way It Should Be
sponsored by CA Technologies.
WEBCAST: In this expert webcast, mobility expert Jack Madden takes and in-depth look at mobile management, discussing the critical role management plays in all aspects of the mobile environment and examining some of the most effective strategies and solutions are available to you.
Posted: 27 Mar 2014 | Premiered: Mar 24, 2014

CA Technologies.

Three ways service management can connect the business with IT
sponsored by Hewlett-Packard Company
WEBCAST: It's no secret that many organizations suffer from a huge gap between business and IT departments. If yours is one of them, don't lose hope -- IT service management can help bridge that gap. Watch this comprehensive webcast to explore how to improve quality of IT services and gain competitive advantage.
Posted: 05 Feb 2014 | Premiered: Feb 5, 2014

Hewlett-Packard Company

Macs, Malware and Security Myths
sponsored by Symantec Corporation
WEBCAST: This in-depth resource takes a look at the various threats that can harm Macs and the role of malware in these potential threats.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement