IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Internet Usage Policies

RSS Feed   
Internet Usage Policies White Papers (View All Report Types)
 
Improve your threat protection with a strong acceptable-use policy and mobile security
sponsored by Verizon
WHITE PAPER: An acceptable-use policy (AUP) is a set of guidelines for acceptable ways an employee is permitted to use the internet, a network or a connected device. AUPs can help limit exposure to online threats and protect organizations against security compromises. Open this white paper to find 9 steps to start building your AUP.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

It Operations Predictions 2021
sponsored by Splunk
WHITE PAPER: Dive into this 26 page whitepaper to uncover top predictions and strategies for IT operations in 2021, looking at automation, remote work, observability and more.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  IT Management
Splunk

Pennsylvania Lumbermens Mutual Insurance Company (PLM) Case Study
sponsored by VMware
WHITE PAPER: Understand how PLM uses VMware Cloud on AWS for their DR needs and how it helped them optimize their DR costs.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  IT Management
VMware

VIRTUAL MACHINES DELIVERED AS A SERVICE
sponsored by HPE and Intel®
WHITE PAPER: Virtual machines offer significant advantages for applications in terms of deployment flexibility, security, and management. However, assembling the right virtualization solution for your specific workload needs—performance, resiliency, scalability, and more—can be difficult and costly. Open up this paper to learn more.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  IT Management
HPE and Intel®

A guide to upgrading ServiceNow in 7 days
sponsored by AutomatePro
WHITE PAPER: This white paper uncovers a quicker way to upgrade and re-test ServiceNow platforms that won’t take away from team resources, covering everything from the planning stages to comparison and final test results. Open now to get started.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

TOPICS:  IT Management
AutomatePro

5 Tips for Evaluating AI-Driven Security Solutions
sponsored by BlackBerry
WHITE PAPER: In this new era of cybersecurity, vendors like to boast about their supposed AI capabilities. The problem is that AI has become a favorite term of marketers and has been watered down to buzzword status. Read this evaluation guide to learn how to cut through the noise and evaluate AI solutions.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  Security
BlackBerry
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences