IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Usage PoliciesMultimedia (View All Report Types)
 
HP Introduces New Approach to Infrastructure Management
sponsored by HP and Intel
WEBCAST: Check out this concise webcast to find out about this new approach to infrastructure management, and how it can make your job easier.
Posted: 04 Feb 2014 | Premiered: Feb 4, 2014

HP and Intel

What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Rethinking Enterprise Mobility: The Way It Should Be
sponsored by CA Technologies.
WEBCAST: In this expert webcast, mobility expert Jack Madden takes and in-depth look at mobile management, discussing the critical role management plays in all aspects of the mobile environment and examining some of the most effective strategies and solutions are available to you.
Posted: 27 Mar 2014 | Premiered: Mar 24, 2014

CA Technologies.

More Visibility for UK ITSP Drives Profitability
sponsored by Autotask Corporation
VIDEO: This brief video covers the value of visibility to your business.
Posted: 30 Jan 2014 | Premiered: 30 Jan 2014

Autotask Corporation

Understanding Big Data and Security
sponsored by Hewlett-Packard Limited
WEBCAST: This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.
Posted: 25 Feb 2014 | Premiered: Apr 16, 2013

Hewlett-Packard Limited

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by CDW and IBM
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

CDW and IBM

Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

A Day in the Life of a CIO
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive guide explores a day in the life of a CIO, highlighting their role in the enterprise and what they can do to enhance their IT productivity.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement