IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed    Add to Google    Add to My Yahoo!
AUP Reports
 
Guide to Mobile Device Management Software
sponsored by SearchSecurity.com
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Understanding Consumer Device Management and BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

SearchSecurity.com

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Email Archiving: Planning, Policies, and Product Selection - Chapter 2: Defining an Email Archiving Policy
sponsored by Symantec Corporation, created by SearchExchange.com
BOOK: Email archiving policies are the leading way to hedge against litigation of email misuse or questionable deletions. Read the second chapter of this email archiving ebook and get best practices on archiving policies, retention and staff responsibili...
Posted: 06 Jun 2007 | Published: 06 Jun 2007

Symantec Corporation, created by SearchExchange.com

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Thinking inside the Box: Benefits of an Internet Filtering Appliance
sponsored by St. Bernard Software
WHITE PAPER: In this IDC white paper, learn the benefits of an appliance-based Internet filtering solution that provides corporations, government agencies and educational institutions with a cost-effective way of managing Internet access.
Posted: 20 Feb 2006 | Published: 01 May 2004

St. Bernard Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement