IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Web Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Web Usage Policies Multimedia (View All Report Types)
Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


How to Turn Data into Actionable Threat Intelligence
sponsored by BrightPoint Security
VIDEO: This brief video presents a way to automate the analysis of threat intelligence, turning it into data you can use to enhance your security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

What if your App Virtualization Solution Didn't Include Image Deployment?
sponsored by Dell, Inc.
VIDEO: Watch this video to see Brian Madden deal with updating desktop servers which result in none of the updated computers having the same image deployment. Find out how application virtualization solutions that don't include image deployment can be an ambitious task for IT pros to handle.
Posted: 03 Sep 2015 | Premiered: 03 Sep 2015

Dell, Inc.

How Cloud Drives Organizational Culture Change
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, tune into a discussion with Ozan Talu, director of Dell Cloud Dedicated Services, on how the cloud drives organizational culture change through technology and organizational transformation, leading to improved business outcomes.
Posted: 21 Aug 2015 | Premiered: Aug 21, 2015

Dell, Inc.

Re-Imagining Business in the Digital Economy
sponsored by SAP America, Inc.
WEBCAST: In this webcast, join Amr El Meleegy and Christopher Dinkel as they describe tech trends that are inspiring disruption across the organization. Learn how to leverage these disruptors by enabling IT with technical debt reversal, social activation, cloud orchestration, and more.
Posted: 10 Aug 2015 | Premiered: Jun 25, 2015

SAP America, Inc.

Infrastructure Shopping with an Ever-Shrinking Budget
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast shows three IT professionals break down the best ways to make major changes in your enterprise IT.
Posted: 24 Sep 2015 | Premiered: May 20, 2015

Dell, Inc. and Intel®

Bolstering Your Mobile Mojo: The Current State of Enterprise Mobility
sponsored by IBM
WEBCAST: Keeping up with the age of mobile can be difficult but this webcast will help you get connected with one enterprise cloud solution for your organization's mobile device management (MDM). Get access to the benefits of your business working in the cloud.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: This webcast shows how the top EMM operating system contenders stack up: iOS, Android, and Windows. Click here to see which OS overcomes its competitors in the battle for EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014


vGPU Horizon 7: Video Demonstration
sponsored by NVIDIA/VMware
VIDEO: Now, even the most intense graphics apps can run on VDI. See a demonstration of vGPU capabilities in this video.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement