IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Usage PoliciesMultimedia (View All Report Types)
 
Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

The Story Behind The PCI Data Security Standard 3.0
sponsored by CDW Corporation
WEBCAST: This webcast reveals how PCI DSS has changed and several ways to manage compliance.
Posted: 29 Sep 2014 | Premiered: May 30, 2014

CDW Corporation

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Brian Madden State of the Industry: Managing at the Windows Level
sponsored by AppSense
VIDEOCAST: In this video, expert Brian Madden discusses key desktop management trends, challenges and technologies, and reveals how to better manage your Windows users, accounts, and applications in virtual desktops. Find out how to securely and effectively deliver applications through virtual desktops to your predominantly mobile workforce.
Posted: 04 Dec 2014 | Premiered: Dec 4, 2014

AppSense

Prefabricated Data Center Modules Provide Predictable Performance
sponsored by Schneider Electric
VIDEO: This video examines how combining a high level of integration together with factory assembly and testing enables Schneider Electric's prefabricated data center modules to take a lot of the guesswork out of designed facility performance.
Posted: 30 Oct 2014 | Premiered: 13 Jan 2014

Schneider Electric

Experts Addressing IT Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: The mobile workforce has different needs than your traditional workers.  You need to make sure you're protecting the data outside the company walls.
Posted: 09 Sep 2014 | Premiered: Feb 28, 2013

CommVault

Enable Mobile Workforce Productivity without Putting your Organization at Risk
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

CA Nimsoft Monitor Powers Up Cloud Services Management for IIJ Global Solutions Singapore
sponsored by CA Technologies.
VIDEO: Access this video to learn why IIJ Global Singapore chose to offer CA Unified Infrastructure Management (CA UIM) network and systems management services as an additional solution for their enterprise clients. You'll learn how this solution delivers better visibility into cloud resources across IT to management stakeholders.
Posted: 04 Nov 2014 | Premiered: 09 Oct 2014

CA Technologies.

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement