IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Reports
 
Enterprise Device Management: A Brave New World
sponsored by SearchSecurity.com
EGUIDE: Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.
Posted: 06 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by SearchSecurity.com
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

SearchSecurity.com

Preventing Malware Attacks
sponsored by SearchSecurity.com
EGUIDE: As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

Secure Web Gateway Overview: Implementation Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
Posted: 10 May 2013 | Published: 10 May 2013

SearchSecurity.com

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.
Posted: 10 May 2010 | Published: 10 May 2010

St. Bernard Software

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

10 Easy Steps for Email and Web Best Practices
sponsored by Symantec Hosted Services
WHITE PAPER: Misuse and abuse of email and Web servers can create costly legal, regulatory, security and productivity risks for organizations. Read this paper to learn 10 best practices for maximizing compliance and minimizing email and Web risk in your org...
Posted: 02 Nov 2006 | Published: 01 Nov 2006

Symantec Hosted Services

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement