Security Policy In IctWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Policy In Ict returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Endpoint Security
 •   Wireless Security
 •   Application Security
 •   Security Monitoring
 •   Virtualization

Related Searches
 •   Building Security Policy In
 •   Improving Security
 •   Print Security Policy
 •   Request Security Policy In
 •   Review Security
 •   Security North Dakota
 •   Security Policy Benefit
 •   Security Policy Methodology
 •   Security Policy Problems
 •   Security Policy White Papers
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 10, 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 01, 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

City University London Policy Challenge Report: Removing barriers to government using SME IT suppliers by ComputerWeekly.com

August 18, 2010 - (Free Research)
The present need to radically cut public expenditure provides a once in a generation opportunity to transform the efficiency of the public sector. In order to achieve this, the public sector needs to radically change its current business processes to achieve greater efficiency. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 14, 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

Using ICT financing for strategic gain by ComputerWeekly.com

July 08, 2013 - (Free Research)
Analysts Clive Longbottom and Rob Bamford offer advice to smaller businesses on financing and leasing of ICT hardware and software 
(ANALYST REPORT) READ ABSTRACT |

Capturing the ICT Dividend by ComputerWeekly.com

December 01, 2011 - (Free Research)
This report from Oxford Economics and AT&T shows ICT investment and productivity growth are closely linked - and European countries are lagging behind other parts of the world in both areas. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly - 17 January 2012: featuring the future of IT education; G-Cloud in action; networking challenges by ComputerWeekly.com

January 17, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the future of computer science education now the government has scrapped the current ICT curriculum, and what this means for the IT industry. We talk to an early adopter of the government G-Cloud plan; and we examine the key challenges for network architects. Download the new issue now. 
(EZINE)

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 30, 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

Jericho Forum - the vision by ComputerWeekly.com

November 10, 2010 - (Free Research)
Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation. 
(WHITE PAPER) READ ABSTRACT |

Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team. by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security. 
(CASE STUDY) READ ABSTRACT |

Super themes shaping the ICT agenda in 2013 by ComputerWeekly.com

February 06, 2013 - (Free Research)
Tim Jennings, chief IT analyst at Ovum identifies seven super themes that will shape the ICT agenda for the year ahead. 
(ANALYST BRIEF) READ ABSTRACT |

How to Create a Mobile Security Policy by SearchSecurity.com

October 09, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices. 
(EGUIDE) READ ABSTRACT |

Creating and Enforcing Email Security Policies by SearchSecurity.com

December 02, 2013 - (Free Research)
This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation. 
(EGUIDE) READ ABSTRACT |

BYOD Security Policy, not MDM, at Heart of Smartphone Security by Symantec Corporation

May 14, 2013 - (Free Research)
This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down. 
(EGUIDE) READ ABSTRACT |

Enforcing Endpoint Security: Creating a Network Security Policy by SearchSecurity.com

June 21, 2012 - (Free Research)
As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them. 
(EGUIDE) READ ABSTRACT |

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by IronKey

May 26, 2009 - (Free Research)
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

G-Cloud Report: G-Cloud Programme - Strategic Outline Case by ComputerWeekly.com

February 07, 2011 - (Free Research)
This Strategic Outline Business Case sets out the opportunity to reduce costs and enhance flexibility of centralised ICT services, covering both information services delivered to citizens and staff, and the underpinning technical and physical Data Centre infrastructure. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Physical Security Awareness and Smartphone Security Policy by SearchSecurity.com

February 13, 2012 - (Free Research)
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee. 
(EGUIDE) READ ABSTRACT |

Defining and Enforcing a Clear Mobile Device Security Policy by SearchSecurity.com

February 18, 2013 - (Free Research)
If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more. 
(EGUIDE) READ ABSTRACT |

BYOD Security Policy Considerations and Best Practices by SearchSecurity.com

November 26, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control. 
(EGUIDE) READ ABSTRACT |

How Key MDM Features Affect Mobile Security Policy Management by SearchSecurity.com

September 20, 2013 - (Free Research)
In this expert guide from SearchSecurity.com, find out how to tackle developing your organization's mobile policy around the latest MDM solutions. Discover which features impact security the most and how you can establish a strategy that compliments them. 
(EGUIDE) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Presentation Transcript: Setting up Security Policies and Procedures for the Cloud by Webroot

August 19, 2011 - (Free Research)
This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Analyst Insight: Is There a Smart City Market? by ComputerWeekly.com

May 10, 2012 - (Free Research)
The value of the IT market for smart cities globally is approximately $35bn, according to this in depth analysis from Ovum. 
(ANALYST REPORT) READ ABSTRACT |

Where is the smart money going in ICT ? by ComputerWeekly.com

March 24, 2011 - (Free Research)
Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts