IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Web Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Web Usage Policies Multimedia (View All Report Types)
 
How to Effectively Replace BlackBerry Devices and Gain User Acceptance
sponsored by Citrix
WEBCAST: This on-demand webinar teaches you how to address mobile privacy concerns and security challenges with BlackBerry replacements. View the webinar now to learn how you can keep your enterprise safe and secure without sacrificing a great mobile user experience.
Posted: 20 Mar 2015 | Premiered: Mar 20, 2015

Citrix

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

The Importance of Integrating Printing/Imaging Into Your IT Security Strategy
sponsored by Hewlett-Packard Limited
WEBCAST: This exclusive webcast dives into some of the toughest challenges with print and imaging security.  Read on to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

MobileIron Platform Overview
sponsored by MobileIron
VIDEO: Access this one-of-a-kind video and find out how one company can successful protect your mobile devices and applications.
Posted: 11 Mar 2015 | Premiered: 16 Jun 2014

MobileIron

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

How To Achieve Security in a World Where Developers Rule
sponsored by Rackspace
VIDEO: This webcast features Rackspace Cloud Solutions Architect Jaret Chiles, and Senior Product Security Engineer Matt Tesauro, who explain how to secure your applications in the cloud.
Posted: 13 Nov 2014 | Premiered: 09 Jun 2014

Rackspace

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Vulnerability Assessment: Discover Holes in Your Database Security With This Easy-to-Configure Trial
sponsored by IBM
VIDEO: This video provides a simple explanation of how to deploy a 30-day trial of a leading vulnerability assessment platform, giving you critical insight into your enterprise's security vulnerabilities in no time.
Posted: 02 Feb 2015 | Premiered: 06 Nov 2014

IBM

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement