Policies ITWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policies IT returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Security Policies
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Management and Maintenance

Related Searches
 •   Create Policies
 •   File Policies IT
 •   Metrics Policies IT
 •   Planner Policies IT
 •   Policies Article
 •   Policies Calendars
 •   Policies IT Managers
 •   Policies IT White Paper
 •   Policies Tennessee
 •   Template Policies IT
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Compliance Driven Security by Dell, Inc.

June 18, 2012 - (Free Research)
With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program. 
(WHITE PAPER)

Is Your Network Ready for Cloud Computing - Presentation Transcript by Cisco Systems, Inc.

February 08, 2012 - (Free Research)
This presentation transcript will look at areas to cover with the cloud provider, including possible adjustments to firewalls and other perimeter defenses such as IPS, and how to ensure the changes don’t violate security policy. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Mobility: BYOD vs. CYOD by Insight

February 28, 2013 - (Free Research)
Whether you choose to implement a bring-your-own-device (BYOD) or a choose-your-own-device (CYOD) policy, IT still needs to meet the mobility challenge with an integrated solution. This white paper will help you learn about a holistic approach to managing the mobile technologies in your network, no matter how you choose to deploy them. 
(WHITE PAPER) READ ABSTRACT |

Drive Performance by Giving Business Users Faster, Better Data Visualization Tools Anyone Can Use by SAS

July 31, 2013 - (Free Research)
Data is pouring in from every direction for organizations today, and many struggle to manage the volume. It's structured and unstructured, messy and overwhelming. If it's managed correctly, the flood of data can provide organizations with invaluable information. Find out how to improve business decisions by reading this resource now. 
(WHITE PAPER) READ ABSTRACT |

Policy Reference Guide: Blackberry Enterprise Server by BlackBerry

December 2008 - (Free Research)
Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

Expert tips for securing mobile devices in the enterprise by SearchSecurity.com

July 2012 - (Free Research)
This expert e-guide explores the ins and outs of developing a comprehensive mobile device management strategy to enable secure Bring Your Own Device (BYOD). Find out how to plug key security vulernabilities, support devices and craft new policies. 
(EGUIDE) READ ABSTRACT |

NAC at the Endpoint: Control Your Network through Device Compliance by Sophos, Inc.

July 2008 - (Free Research)
Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices. 
(WHITE PAPER) READ ABSTRACT |

Six Ways to Embrace IT Consumerization by Webroot

March 2013 - (Free Research)
Here are six ways your organization can embrace consumerization. Get some helpful tips for working with end-users, focusing IT's role, avoiding "crapplications", and more. 
(EGUIDE) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

May Information Security Magazine by SearchSecurity.com

April 2013 - (Free Research)
This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more! 
(EZINE) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

Consumerization 101: Defining & Enforcing a Successful BYOD Policy by SearchSecurity.com

January 2013 - (Free Research)
This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft. 
(EGUIDE) READ ABSTRACT |

BYOD: Policy Creation and it's Increasingly Growing Need by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy. 
(EGUIDE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2008 "Starter" GPOs by Global Knowledge

December 2008 - (Free Research)
An old Chinese proverb advises us to "preserve the old, but know the new." Microsoft's old template concept has been preserved in the Windows Server 2008 operating system, in the form of what Microsoft calls the starter GPO (Group Policy Object). 
(WHITE PAPER) READ ABSTRACT |

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Developing an Effective Corporate Mobile Policy by BlackBerry

June 2008 - (Free Research)
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

10 Steps to Establishing an Effective Email Retention Policy by CA Technologies.

January 2009 - (Free Research)
Building a well-planned, enterprise-wide email retention policy helps establish uniform and consistent rules for all email and electronic records. 
(WHITE PAPER) READ ABSTRACT |

IT Policy Compliance for Dummies® by Qualys

April 2010 - (Free Research)
This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements. 
(EBOOK) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts