IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policy

RSS Feed    Add to Google    Add to My Yahoo!
Acceptable Use Policy Reports
 
Guide to Mobile Device Management Software
sponsored by SearchSecurity.com
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

How to Integrate UC with Mobile Device Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com offers best practices for managing mobile unified communications (UC) in a bring your own device (BYOD) environment. Read now for tips and hints to integrating mobile device management (MDM) with your UC systems and features.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

SearchSecurity.com

Secure Web Gateway Overview: Implementation Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
Posted: 10 May 2013 | Published: 10 May 2013

SearchSecurity.com

Mobile Application Management in the BYOD Era
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

SearchSecurity.com

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.
Posted: 10 May 2010 | Published: 10 May 2010

St. Bernard Software

Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Thinking inside the Box: Benefits of an Internet Filtering Appliance
sponsored by St. Bernard Software
WHITE PAPER: In this IDC white paper, learn the benefits of an appliance-based Internet filtering solution that provides corporations, government agencies and educational institutions with a cost-effective way of managing Internet access.
Posted: 20 Feb 2006 | Published: 01 May 2004

St. Bernard Software

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement