IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policies

RSS Feed   
ALSO CALLED: AUP, Acceptable Use Policy, Internet Usage Policies, Usage Policies, Web Usage Policies
DEFINITION: An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet service provider (ISP), you will usually be presented  … 

Acceptable Use Policies definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Acceptable Use Policies Multimedia (View All Report Types)
26 - 50 of 559 Matches Previous Page  |  Next Page
Adopting a Zero Trust Model: Google Did It, Can You?
sponsored by Zscaler
WEBCAST: In this webinar hear from Ameet Jani, Product Manager at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero-trust security, and how to take a user and application-centric approach to application access.
Posted: 09 Oct 2018 | Premiered: Apr 27, 2018

TOPICS: 
Zscaler

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

TOPICS: 
Arctic Wolf

An Introduction to Threat Hunting with Bro Zeek
sponsored by CoreLight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

TOPICS: 
CoreLight

An Overview of Endpoint Detection & Response (EDR)
sponsored by Trend Micro, Inc.
WEBCAST: ESG Senior Principal Analyst Jon Oltsik discusses an overview of Endpoint Detection & Response (EDR) in the market, including trends, challenges, and how automation can help.
Posted: 06 Feb 2019 | Premiered: Mar 23, 2018

TOPICS: 
Trend Micro, Inc.

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

TOPICS: 
Arctic Wolf

Accenture: How a New Partnership Enables Digital Transformation
sponsored by Microsoft
WEBCAST: Learn how three respected enterprises teamed up to help other organizations create better solutions for the digital age.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS: 
Microsoft

Accenture: How Leading Enterprises Are Reimagining ERP
sponsored by Microsoft
WEBCAST: Traditional ERP is no longer enough. Learn how to shift to New IT to boost agility and responsiveness.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS: 
Microsoft

Accenture: How Vodafone Transformed Its ERP and Its Business
sponsored by Microsoft
WEBCAST: Access this case study to hear Vodafone's GlobalHead of Business Intelligence discuss using HANA to unlock value.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS: 
Microsoft

Accenture: SAP HANA: Solution Overview
sponsored by Microsoft
WEBCAST: Discover how SAP HANA allows you to transform your business by conducting transactions and analysis in real time,
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS: 
Microsoft

Accenture: The Best Path to SAP S/4HANA Migration
sponsored by Microsoft
WEBCAST: Real-time responsiveness is now required. Learn why S/4HANA is the only answer, and how to migrate without interruption.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS: 
Microsoft

Accenture: Unlocking the Potential of SAP S/4HANA
sponsored by Microsoft
WEBCAST: In today's world, only high-velocity enterprises survive. Learn to drive digital advantage by leveraging SAP S/4HANA.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS: 
Microsoft

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

TOPICS: 
IBM

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

TOPICS: 
Intel

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS: 
IBM

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS: 
IBM

Al Powers Smarter Investment Decisions - Intel Chip Chat
sponsored by Intel and Google
PODCAST: Listen to this Intel Chip Chat podcast to learn how a natural language interface used on Intel® Xeon® Scalable processors available on Google Cloud Platform can help financial institutions make more informed decisions.
Posted: 05 Jun 2018 | Premiered: Jun 5, 2018

TOPICS: 
Intel and Google

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

TOPICS: 
AlienVault

All-Flash Storage Boosts Telecom's Performance Guarantees
sponsored by NetApp
VIDEO: Learn why matching the performance of compute, network and storage to the workload needs of enterprise customers is key.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS: 
NetApp

An Introduction to Intelligent Desktop Virtualization (IDV)
sponsored by Virtual Computer, Inc.
VIDEOCAST: Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast.
Posted: 23 Feb 2012 | Premiered: Feb 23, 2012

TOPICS: 
Virtual Computer, Inc.

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

TOPICS: 
Imperva

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

TOPICS: 
Sophos

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

TOPICS: 
Lumension

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

TOPICS: 
Virtual Instruments

AppSense DataNow
sponsored by AppSense
VIDEOCAST: Learn how your organization can provide instant access to work documents from mobile devices. This videocast presents a solution that extends your IT infrastructure out into the mobile world in minutes.
Posted: 19 Jun 2012 | Premiered: Jun 19, 2012

TOPICS: 
AppSense

As Your Business Grows, How Can You Shrink Your Carbon Footprint?
sponsored by Dimension Data
WEBCAST: This informative blog post explores how you can transform your business model with the cloud in order to both reduce IT costs and lower your carbon footprint. Download now to uncover other technologies you can use to reduce your impact on the planet.
Posted: 20 Nov 2015 | Premiered: Nov 20, 2015

TOPICS: 
Dimension Data
26 - 50 of 559 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement