IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Usage Policies

RSS Feed    Add to Google    Add to My Yahoo!
Usage Policies Reports
Mobile Application Management in the BYOD Era
sponsored by
EGUIDE: This expert E-Guide from serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

Preventing Malware Attacks
sponsored by
EGUIDE: As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by
EGUIDE: In this expert E-Guide from, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

How to Integrate UC with Mobile Device Management
sponsored by
EGUIDE: This E-Guide from offers best practices for managing mobile unified communications (UC) in a bring your own device (BYOD) environment. Read now for tips and hints to integrating mobile device management (MDM) with your UC systems and features.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by
EBOOK: This IT Handbook from offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

Guide to Mobile Device Management Software
sponsored by
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Mitigating Risk in a Mobile World
sponsored by Symantec Corporation
WHITE PAPER: Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Symantec Corporation

Email Archiving: Planning, Policies, and Product Selection - Chapter 2: Defining an Email Archiving Policy
sponsored by Symantec Corporation, created by
BOOK: Email archiving policies are the leading way to hedge against litigation of email misuse or questionable deletions. Read the second chapter of this email archiving ebook and get best practices on archiving policies, retention and staff responsibili...
Posted: 06 Jun 2007 | Published: 06 Jun 2007

Symantec Corporation, created by

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement