IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Usage PoliciesMultimedia (View All Report Types)
 
Security Assessment Team Helps Hospital Revamp their Security Infrastructure
sponsored by CDW Corporation
VIDEO: Find out what a security assessment team found after evaluating a hospital's security infrastructure, policies and procedures.
Posted: 02 Oct 2014 | Premiered: 02 Oct 2014

CDW Corporation

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Enable Mobile Workforce Productivity without Putting your Organization at Risk
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

StruxureWare for Data Centers - A Hollistic View for Your Team
sponsored by Schneider Electric
VIDEO: View this video to learn about a data center infrastructure management suite to give your team a holistic view across your facility. Control your data center performance and monitor the equipment's ROI, CAPEX, and OPEX through intuitive applications.
Posted: 17 Nov 2014 | Premiered: 12 Apr 2013

Schneider Electric

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu

The Role of Third-Party Applications in APT
sponsored by Lumension
WEBCAST: This valuable webcast explores how criminals are using advanced persistent threats to penetrate organizations defenses for weeks at a time.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

How to Detect System Compromise and Data Exfiltration
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how cyber criminals target your vulnerabilities and offers a demo of a unified security management platform to help you combat these attacks.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Why is Schneider Electric the Right Choice for Prefabricated Data Centers?
sponsored by Schneider Electric
VIDEO: So why is Schneider Electric the right choice for prefabricated data centers? This video examines the proven experience, broad offering of prefab modules, detailed designs, and industry-leading, integrated DCIM software that put Schneider Electric ahead when it comes to prefabricated data centers.
Posted: 30 Oct 2014 | Premiered: 13 Jan 2014

Schneider Electric

The Data Center Life Cycle
sponsored by APC by Schneider Electric
VIDEO: Schneider Electric helps you focus on the Data Centre Life Cycle to keep your business agile to innovate and move forward. From assessing to designing and building and operating the data centre, Schneider works alongside you through the lifecycle as many times as you need to go through it.
Posted: 04 Nov 2014 | Premiered: 06 Nov 2013

APC by Schneider Electric

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement