IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Web Usage Policies

RSS Feed   
Web Usage Policies White Papers (View All Report Types)
 
Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

The Business Value of Hybrid Cloud
sponsored by VMware
WHITE PAPER: Discover how VMware customers were able to achieve strong business value and cost reductions.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  IT Management
VMware

NAP: The Secret to Modern Application Security
sponsored by NGINX
WHITE PAPER: The ‘build once, run anywhere’ approach to modern application development can be applied to application security—with a few adjustments, of course. By introducing automation into security strategies, developers can deliver a ‘build once, adhere everywhere’ guideline for security policies. See how NGINX App Protect does just that and more here.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

TOPICS:  Security
NGINX

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Securing OT in the Face of IIoT and 5G
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the impact of IIoT and 5G on security for a modern OT environment as well as the architectural considerations for providing secure connectivity in the enterprise.
Posted: 05 May 2021 | Published: 05 May 2021

TOPICS:  Security
Fortinet, Inc.

OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT
sponsored by Synopsys
WHITE PAPER: Open-source security and risk analysis is crucial for every and any IT team. That’s why this report provides an in-depth snapshot of the current state of open-source security, compliance, licensing, and code quality risk in commercial software. Keep your software secure. Read the report here.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TOPICS:  Security

3 ways Red Hat Ansible Automation Platform accelerates financial services innovation
sponsored by Red Hat
WHITE PAPER: The financial services industry is experiencing widespread disruption caused by the digital demands of an increasingly connected customer. Financial services companies must create the scale and capabilities to compete against new digitally native competitors.  Read on to learn more.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TOPICS:  IT Management
Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences