IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Web Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Web Usage Policies Multimedia (View All Report Types)
 
6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

Increase Security, Not Complexity
sponsored by Fortinet, Inc.
WEBCAST: This short video introduces the Fortinet Enterprise Firewall, which can secure your entire network, end to end, and can scale in tandem with the increasing intricacy of attacks. View now and learn how to unlock increased security and performance without adding on unnecessary complexity.
Posted: 10 Oct 2016 | Premiered: Oct 10, 2016

Fortinet, Inc.

Evaluating Red Hat Virtualization
sponsored by Red Hat
SOFTWARE DEMO: Is your enterprise ready to securely and confidently virtualize mission-critical applications, while gaining unparalleled performance and scalability? Take advantage of this free trial of Red Hat Virtualization now to evaluate its compatibility with your organization.
Posted: 24 Jan 2017 | Premiered: 24 Jan 2017

Red Hat

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

Magic Quadrant for Mobile Data Protection Solutions
sponsored by Intel Security
WEBCAST: Learn the strengths and cautions for the vendors in Gartner's Mobile Data Protection Solutions Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Transform Your Applications, Transform Your Business
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Gain an idea of what features are most important for your business as you look to move away from a dated legacy platform and select the right technology partner.
Posted: 16 Sep 2016 | Premiered: 02 Aug 2016

Hewlett-Packard Enterprise

Build a Lean Cloud Based Security Operations Center
sponsored by Splunk
WEBCAST: Discover how Travis Perkins protected the organization while moving an on-premise legacy SOC to a lean SOC in the cloud.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Video Part 1: Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Intel's CTO for Cloud/SaaS provides security questions to ask when vetting a cloud service or SaaS provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement