IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Internet Usage Policies

RSS Feed   
Internet Usage Policies White Papers (View All Report Types)
 
Improve your threat protection with a strong acceptable-use policy and mobile security
sponsored by Verizon
WHITE PAPER: An acceptable-use policy (AUP) is a set of guidelines for acceptable ways an employee is permitted to use the internet, a network or a connected device. AUPs can help limit exposure to online threats and protect organizations against security compromises. Open this white paper to find 9 steps to start building your AUP.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Counter Ransomware Attacks with Cohesity
sponsored by Cohesity and Wipro
WHITE PAPER: It’s important to be able to counter the ransomware threat by eliminating the risk of expensive downtime. Read on to learn how Cohesity uses machine learning technologies to help you protect your backup data with immutable file protection and multifactor authentication, detect intruders, and accelerate recovery times.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Cohesity and Wipro

IBM Gotchas Guide
sponsored by ClearEdge
WHITE PAPER: Complex contract language and licensing practices make increased costs and audit exposure nearly inevitable unless you understand the risks hidden in your IBM agreements. This easy-to-digest guide shares pitfalls that can lead to lost credits, best practices to mitigate price increases, and more.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ClearEdge

Deliver a CMDB with true business value: 6 essential steps
sponsored by ServiceNow
WHITE PAPER: An unhealthy CMDB can be damaging to an organization. A healthy CMDB, however, can do just the opposite. However, a healthy CMDB doesn’t just happen. You need to identify clear objectives and develop a comprehensive strategy first. Open up this eBook to check out 6 essential steps towards creating and maintaining a healthy CMDB in your oranization.
Posted: 26 Apr 2021 | Published: 26 Apr 2021

TOPICS:  IT Management
ServiceNow

Global Enterprise Mobility Services: Competitive Landscape Assessment
sponsored by Orange Business Services
WHITE PAPER: In their January 2021 Competitive Landscape Assessment for Global Enterprise Mobility Services, GlobalData rated Orange Business Services “Very Strong” in global enterprise mobility. Download the full report for more details, including a full overview of current market perspective, strengths, limitations, and more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

TOPICS:  IT Management
Orange Business Services

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: Access this paper to learn about Customer IAM and how it is similar to IAM and learn the key ways they are different from each other. Find out which could be the right choice for your organization.
Posted: 27 May 2021 | Published: 27 May 2021

TOPICS:  IT Management
Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences