IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Usage Policies Multimedia (View All Report Types)
 
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Detecting and Stopping Sophisticated Cyber Attacks In the Small and Medium-Size Enterprise
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: In this webcast, op security experts discuss the latest online attacks being leveled at the small and mid-sized business, as well as current trends in malware affecting SMBs. It'll outline an array of options for enterprises that must handle today's emerging threats while maintaining a shoestring security budget.
Posted: 22 Nov 2016 | Premiered: Sep 2, 2016

Arctic Wolf Networks, Inc.

Gain Insights in an Instant with Integrated Infrastructure
sponsored by IBM
VIDEO: Tune into this brief video to learn from Steve Duplessie, ESG Founder & Senior Analyst, about an integrated infrastructure that's designed to deliver high levels of ease, efficiency, and versatility across the IT estate. Additionally, discover the top 6 reasons companies turn to integrated, full stack solutions.
Posted: 24 Oct 2016 | Premiered: 27 Jul 2015

IBM

City of LA Maximizes Performance, Cost, and Flexibility with Hyper-Converged Systems
sponsored by NTT ICT
VIDEO: In the following video case study, see how with successful deployment of HPE's hyper-converged systems, the Department of Building and Safety for the city of Los Angeles was able drastically reduce component failure due to overheating; reduce operation costs; and improve on and off-premise data center performance.
Posted: 09 Sep 2016 | Premiered: 21 Dec 2015

NTT ICT

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

The Intricacies of a CASB Revealed
sponsored by BitGlass
WEBCAST: This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.
Posted: 23 Nov 2016 | Premiered: Aug 10, 2016

BitGlass

How to Achieve Transformative Business Outcomes with ITSM
sponsored by Hewlett-Packard Enterprise
VIDEO: Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower operational costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact.
Posted: 19 Sep 2016 | Premiered: 31 Dec 2015

Hewlett-Packard Enterprise

Transform Your Applications, Transform Your Business
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Gain an idea of what features are most important for your business as you look to move away from a dated legacy platform and select the right technology partner.
Posted: 16 Sep 2016 | Premiered: 02 Aug 2016

Hewlett-Packard Enterprise

Discover a Cost-Effective Alternative to Traditional Storage
sponsored by IBM
WEBCAST: Are you challenged by storing large volumes of unstructured data? Look past traditional solutions for a new approach.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Flash makes Apache's Data Sets Easy to Manage
sponsored by NetApp
VIDEO: Apache's modeling applications generate massive amounts of data sets. Find out why they turn to NetApp for solutions.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement