IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policies

RSS Feed   
ALSO CALLED: AUP, Acceptable Use Policy, Internet Usage Policies, Usage Policies, Web Usage Policies
DEFINITION: An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet service provider (ISP), you will usually be presented  … 

Acceptable Use Policies definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Acceptable Use Policies Multimedia (View All Report Types)
76 - 100 of 544 Matches Previous Page  |  Next Page
Bust Threats or Risk Getting Busted
sponsored by Cisco Umbrella
WEBCAST: In this webcast, learn the latest trends on top threats and best practices you can use to protect against threats in your organization. The webcast also reviews steps you can take to improve your threat detection, prevention and remediation efforts.
Posted: 02 May 2019 | Premiered: Mar 31, 2019

Cisco Umbrella

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

Case Study: IT Director, Marek Laskowski, DZP
sponsored by Fidelis
VIDEO: In this video, learn about Fieldis Elevate from IT Director, Marek Laskowski and how it provided DZP with an ability to rapidly detect, investigate, and resolve advanced attacks, enabling the firm to identify both known and unknown threats.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

Fidelis

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

Butterfly Effect: HCI Has Even Bigger Benefits Than You See
sponsored by Riverbed Technology, Inc.
WEBCAST: Learn how ROBO hyperconvergence creates hidden productivity and cost benefits in ways that aren't obvious at first.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

BYOD Initiative and Workforce Mobility with the VMware Mobile Secure Workforce Solution
sponsored by VMware
WEBCAST: This exclusive webcast examines an enterprise mobility solution for simplifying IT control and keeping your workforce mobile.
Posted: 17 Oct 2013 | Premiered: Oct 17, 2013

VMware

Calling All CIOs: Why It's Time to Rethink Branch IT
sponsored by Riverbed Technology, Inc.
WEBCAST: Branch IT is not an afterthought. Learn how to boost ROBO performance with less branch IT and lower costs.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Capabilities for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Compare critical capabilities across Security Information and Event Management vendors to choose the best SIEM solution.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Case Based Alarms - Relevant and Actionable
sponsored by Virtual Instruments
VIDEO: Uncover the key features of a new approach to infrastructure monitoring that only sends 1 alert at a time, and contains all relevant case history in that alert.
Posted: 09 Jun 2014 | Premiered: 09 Jun 2014

Virtual Instruments

Case Study: FujiFilm's Evolving Digital Work in the Cloud
sponsored by Dimension Data
VIDEO: FujiFilm needed help creating a mobile and in-store image-storing and printing platform. Learn how cloud enabled them.
Posted: 19 Jun 2015 | Premiered: 19 Jun 2015

TOPICS:  IT Management
Dimension Data

Case Study: How SunTrust Caught Up With Analytics
sponsored by SAS
WEBCAST: SunTrust's outdated tech had it falling behind competitors. Find out how it caught up with automation and optimization.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Case Study: How the Orlando Magic Improved Fan Experience
sponsored by SAS
WEBCAST: Fan experience is crucial to satisfaction. Discover how the NBA uses analytics to improve tickets, concessions and more.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Case Study: How Visa Tailored Services With Analytics
sponsored by SAS
WEBCAST: Credit card fraud is always evolving. Find out how Visa used analytics to minimize invalid transactions.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Case Study: Lenovo Uses Analytics for Redesign
sponsored by SAS
WEBCAST: Find out how Lenovo has leveraged analytics to cut issue detection time in half.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Enterprise
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Enterprise

Chalk Talk Video: How Zero Branch IT Keeps Your Safe
sponsored by Riverbed Technology, Inc.
VIDEO: Branch locations hold 50% of all valuable data. Learn to protect them without on-premises servers, storage or backup.
Posted: 02 Dec 2015 | Premiered: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Chalk Talk: Strategies for Hybrid Cloud Storage
sponsored by IBM
VIDEO: George Crump and Douglas O'Flaherty talk about why hybrid cloud provides the best cost, flexibility and scalability.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Chas Dye the Database Guy on Performance
sponsored by Pure Storage
VIDEO: Free yourself from the shackles of physical I/O. Find out how flash enables better performance and simple management.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

Chas Dye the Database Guy on Resiliency
sponsored by Pure Storage
VIDEO: Databases on traditional SAN often face performance degradation and outages. Learn how new databases enable 100% uptime.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.
76 - 100 of 544 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement