IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Usage Policies Multimedia (View All Report Types)
 
Timing the Perfect ADC Vendor Refresh
sponsored by A10 Networks
WEBCAST: Today's market is all about the app, and consumers care about one thing: accessing them from anywhere, anytime, and above all - securely. Learn how a smart application delivery controller vendor refresh will improve performance, security, management and support..
Posted: 14 Feb 2017 | Premiered: Oct 28, 2016

A10 Networks

Digital Journey with DevOps
sponsored by Atos
VIDEO: IT will play an increasingly ambitious role in the years to come. As we push forward with digital transformation, DevOps will step into the spotlight. This webcast highlights the importance of DevOps practices and the role this new way of computing will improve the customer journey.
Posted: 21 Jun 2017 | Premiered: 23 Nov 2016

Atos

Cherwell Service Management Product Overview Video
sponsored by Cherwell
VIDEO: If you organization is looking to implement, update, or automate ITSM, watch this brief video to learn about Cherwell Service Management software and its key features, including out of the box ITIL certified processes, a modern, intuitive self-service portal, codeless technology, and more.
Posted: 12 Apr 2017 | Premiered: 06 Sep 2016

Cherwell

Do You Effectively Manage Complex Data Transformation?
sponsored by IBM
VIDEO: Discover how to manage transformation with a single solution as data flows through the enterprise.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST: B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST: Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Explore SIEM in the Cloud
sponsored by Splunk
WEBCAST: Explore SIEM in the Cloud
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Balancing User Productivity and Security
sponsored by RES Software
VIDEO: Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.
Posted: 17 Nov 2016 | Premiered: 17 Nov 2016

RES Software

The Importance of B2B Integration
sponsored by IBM
VIDEOCAST: IDC analyst Chandana Gopal explains why the LOB is critical in helping create a modernized B2B architecture.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement