IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Web Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Web Usage Policies Multimedia (View All Report Types)
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


Schenider Podcast: Partnership, evolved; Partnering to Win
sponsored by Schneider Electric
PODCAST: In the following podcast, learn why partnering with the right service provider can make all the difference in your IT environment. Tune in now to learn how to find the right service provider and ensure that your business runs smoothly, even in the wake of new IT pressures like the third platform.
Posted: 29 Sep 2015 | Premiered: Sep 22, 2015

Schneider Electric

STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

Single Sign-On: Past, Present, and Future
sponsored by Centrify Corporation
WEBCAST: Join Pete Lindstrom, Research Director for IDC's Security Products program, and Chris Webber, Security Strategist with Centrify, to learn how the lessons of the past can help IT springboard into the future of Identity.
Posted: 22 Oct 2015 | Premiered: Mar 16, 2015

Centrify Corporation

Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

A New Way to Think about Security
sponsored by IBM
VIDEO: This brief video describes why managed security services (MSS) may be the answer to the increasingly complex question of modern security.
Posted: 14 Sep 2015 | Premiered: 07 Apr 2015


Today's Top 10 Web Hacking Technique
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network as we continue through 2015. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015


Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Monitoring Citrix Mobile Workspace with SCOM plug-in
sponsored by ComTrade
VIDEO: This webcast details a plug-in for Microsoft System Center Operations Manager (SCOM) monitoring platform that monitors the Citrix Workspace Suite. Watch now to see a demo of this solution and find out how its capabilities cover the entire Workspace Suite components.
Posted: 12 Aug 2015 | Premiered: 22 May 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement