IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Reports
 
Mobile Application Management in the BYOD Era
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

SearchSecurity.com

Enterprise Device Management: A Brave New World
sponsored by SearchSecurity.com
EGUIDE: Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.
Posted: 06 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

Understanding Consumer Device Management and BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

SearchSecurity.com

Secure Web Gateway Overview: Implementation Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
Posted: 10 May 2013 | Published: 10 May 2013

SearchSecurity.com

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Filtering the Spectrum of Internet Threats: Defending against Inappropriate Content, Spyware, IM and P2P at the Perimeter
sponsored by St. Bernard Software
WHITE PAPER: This paper reviews how a perimeter network security appliance can be well suited for SMBs because it lowers total cost of ownership with rapid deployment and ease of configuration, and provides a secure and stable appliance-based solution.
Posted: 20 Feb 2006 | Published: 01 Jan 2005

St. Bernard Software

Mitigating Risk in a Mobile World
sponsored by Symantec Corporation
WHITE PAPER: Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Symantec Corporation

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement