IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policies

RSS Feed   
ALSO CALLED: AUP, Acceptable Use Policy, Internet Usage Policies, Usage Policies, Web Usage Policies
DEFINITION: An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet service provider (ISP), you will usually be presented  … 

Acceptable Use Policies definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Acceptable Use Policies Multimedia (View All Report Types)
76 - 100 of 561 Matches Previous Page  |  Next Page
Case Study: IT Director, Marek Laskowski, DZP
sponsored by Fidelis
VIDEO: In this video, learn about Fieldis Elevate from IT Director, Marek Laskowski and how it provided DZP with an ability to rapidly detect, investigate, and resolve advanced attacks, enabling the firm to identify both known and unknown threats.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

TOPICS: 
Fidelis

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals have hacked into many name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down. In this webcast, Brian NeSmith walks through cybersecurity predictions and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

TOPICS: 
Arctic Wolf

BYOD Initiative and Workforce Mobility with the VMware Mobile Secure Workforce Solution
sponsored by VMware
WEBCAST: This exclusive webcast examines an enterprise mobility solution for simplifying IT control and keeping your workforce mobile.
Posted: 17 Oct 2013 | Premiered: Oct 17, 2013

TOPICS: 
VMware

Calling All CIOs: Why It's Time to Rethink Branch IT
sponsored by Riverbed Technology, Inc.
WEBCAST: Branch IT is not an afterthought. Learn how to boost ROBO performance with less branch IT and lower costs.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS: 
Riverbed Technology, Inc.

Capabilities for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Compare critical capabilities across Security Information and Event Management vendors to choose the best SIEM solution.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS: 
Intel Security

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

TOPICS: 
Core Security Technologies

Case Based Alarms - Relevant and Actionable
sponsored by Virtual Instruments
VIDEO: Uncover the key features of a new approach to infrastructure monitoring that only sends 1 alert at a time, and contains all relevant case history in that alert.
Posted: 09 Jun 2014 | Premiered: 09 Jun 2014

TOPICS: 
Virtual Instruments

Case Study: FujiFilm's Evolving Digital Work in the Cloud
sponsored by Dimension Data
VIDEO: FujiFilm needed help creating a mobile and in-store image-storing and printing platform. Learn how cloud enabled them.
Posted: 19 Jun 2015 | Premiered: 19 Jun 2015

TOPICS: 
Dimension Data

Case Study: How SunTrust Caught Up With Analytics
sponsored by SAS
WEBCAST: SunTrust's outdated tech had it falling behind competitors. Find out how it caught up with automation and optimization.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS: 
SAS

Case Study: How the Orlando Magic Improved Fan Experience
sponsored by SAS
WEBCAST: Fan experience is crucial to satisfaction. Discover how the NBA uses analytics to improve tickets, concessions and more.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS: 
SAS

Case Study: How Visa Tailored Services With Analytics
sponsored by SAS
WEBCAST: Credit card fraud is always evolving. Find out how Visa used analytics to minimize invalid transactions.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS: 
SAS

Case Study: Lenovo Uses Analytics for Redesign
sponsored by SAS
WEBCAST: Find out how Lenovo has leveraged analytics to cut issue detection time in half.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS: 
SAS

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

TOPICS: 
CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Enterprise
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

TOPICS: 
Hewlett-Packard Enterprise

Chalk Talk Video: How Zero Branch IT Keeps Your Safe
sponsored by Riverbed Technology, Inc.
VIDEO: Branch locations hold 50% of all valuable data. Learn to protect them without on-premises servers, storage or backup.
Posted: 02 Dec 2015 | Premiered: 02 Dec 2015

TOPICS: 
Riverbed Technology, Inc.

Chalk Talk: Strategies for Hybrid Cloud Storage
sponsored by IBM
VIDEO: George Crump and Douglas O'Flaherty talk about why hybrid cloud provides the best cost, flexibility and scalability.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS: 
IBM

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

TOPICS: 
ServiceNow

Chas Dye the Database Guy on Performance
sponsored by Pure Storage
VIDEO: Free yourself from the shackles of physical I/O. Find out how flash enables better performance and simple management.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS: 
Pure Storage

Chas Dye the Database Guy on Resiliency
sponsored by Pure Storage
VIDEO: Databases on traditional SAN often face performance degradation and outages. Learn how new databases enable 100% uptime.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS: 
Pure Storage

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

TOPICS: 
CipherCloud

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

TOPICS: 
Cisco Systems, Inc.

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

TOPICS: 
Cisco Systems, Inc.

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

TOPICS: 
Nuance

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

TOPICS: 
Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

TOPICS: 
Red Hat
76 - 100 of 561 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement