Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Employee Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Employee MonitoringReports
51 - 64 of 64 Matches Previous Page  |  Next Page
CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.

Making the Abundant Relevant: Solving Today's Learning Challenges through a Next Generation Technology Architecture
sponsored by SkillSoft Corporation
PRODUCT LITERATURE: Integration is the single most difficult issue facing the learning industry today. Read about Open Learning Services Architecture, a technology initiative that enables higher levels of interoperability, flexibility and the freedom to innovate.
Posted: 01 Nov 2007 | Published: 01 Nov 2007

SkillSoft Corporation

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.
Posted: 27 Sep 2007 | Published: 27 Sep 2007

St. Bernard Software

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

TOTSA Unearths Greater IT Efficiency with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Messaging management, when deployed effectively, has the power to provide IT with knowledge regarding how many messages have been delivered, system measurements and cost allocation. Learn about an email management system that provides these...
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software
51 - 64 of 64 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement