Access DevicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Access Devices returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Wireless Security
 •   Network Management
 •   Access Control
 •   Virtualization
 •   Security Policies

Related Searches
 •   Access Advantages
 •   Access Basic
 •   Access Devices Cycle
 •   Access Devices Frameworks
 •   Access Devices History
 •   Access Devices Pos
 •   Canadian Access Devices
 •   Check Access Devices
 •   Contract Access
 •   Print Access Devices
Advertisement

ALL RESULTS
1 - 25 of 418 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

AGL Resources Relies on F5 Products for Application Traffic Management, Link Load Balancing and Secure Remote Access by F5 Networks, Inc.

December 01, 2004 - (Free Research)
AGL Resources, an Atlanta-based energy services holding company, relies on four different F5 products to support their growing infrastructure investments and to improve their ROI. 
(CASE STUDY) READ ABSTRACT |

Centralized Management Key to Controlling Mobile Communications Cost by Digital Fairway, Inc.

November 2007 - (Free Research)
In this paper, learn why centralized policy management, automated order processing and asset management, and end-user self-service are key ingredients for any organization trying to control the proliferation of wireless mobile devices and spiraling costs. 
(WHITE PAPER) READ ABSTRACT |

HP Virtual Desktop Infrastructure with VMware View: Bring the benefits of industry-standard servers to your desktop environment by HP, Vmware and AMD

January 2009 - (Free Research)
This solution provides a centralized approach to managing your desktop environment and protecting the information within it. It brings the far-reaching benefits of industry-standard servers and shared storage to your desktop environment, while delivering a full virtual PC experience. 
(BROCHURE) READ ABSTRACT |

Virtualized Client Solutions: HP Remote Client Solutions (RCS) by Hewlett-Packard Company

August 2008 - (Free Research)
HP offers client virtualization under its HP Remote Client Solutions (RCS) portfolio, andit includes virtualized client solutions like thin clients blade PCs, blade workstations, VDI and server-based computing. 
(DATA SHEET) READ ABSTRACT |

Automated Storage Optimization for z/OS Mainframes by CA Technologies.

August 2007 - (Free Research)
In this paper learn about how the CA Automated Storage Optimization Mainframe Suite is flexible and modular so there is no need to "rip and replace" as processes, applications and users are added while the value of information evolves. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Managing and Understanding Mobile Authentication by SearchSecurity.com

July 2013 - (Free Research)
In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies. 
(EBOOK) READ ABSTRACT |

The Consumerization of IT: Security Challenges of the New World Order by CA Technologies.

May 2012 - (Free Research)
Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them. 
(WHITE PAPER) READ ABSTRACT |

B.Y.O.D Without the Risk by Juniper Networks, Inc.

June 2012 - (Free Research)
As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable. 
(WHITE PAPER) READ ABSTRACT |

Browser based access to Windows applications and desktops – AccessNow by Ericom by Ericom Software

October 2011 - (Free Research)
Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device. 
(TRIAL SOFTWARE) READ ABSTRACT |

E-Guide: Wireless LAN access control: Managing users and their devices by SearchSecurity.com

July 2011 - (Free Research)
This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions. 
(EGUIDE) READ ABSTRACT |

Lumension Endpoint Security: Device Control and Application Control by Lumension

September 2010 - (Free Research)
The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection. 
(TRIAL SOFTWARE)

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Cisco Any Device: Planning a Productive, Secure and Competitive Future by Cisco (E-mail this company)

August 2011 - (Free Research)
Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security. 
(WHITE PAPER) READ ABSTRACT |

Honey Stick Report Results by Symantec Corporation

April 2012 - (Free Research)
The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2013 - (Free Research)
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met. 
(WHITE PAPER) READ ABSTRACT |

Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0 by Aerohive Networks

July 2011 - (Free Research)
Mobile devices give workers the ability to access critical information anytime, anywhere. Despite the obvious benefits for productivity, network accessibility has also become a serious security concern – especially in the healthcare community. Learn about a cloud-enabled network security approach that helps safeguard confidential patient data. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Network Evolution: Building the Infrastructure to Enable the Changing Face of IT by OnX USA LLC

April 2012 - (Free Research)
This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets. 
(EZINE) READ ABSTRACT |

Single Point of Access, Single Point of Control by Citrix

January 2014 - (Free Research)
Read on to learn how desktop virtualization can help support remote connectivity better than VPN. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Device Management: A Brave New World by SearchSecurity.com

February 2012 - (Free Research)
Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - May 2012 by SearchSecurity.com

May 2012 - (Free Research)
Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more. 
(EZINE) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix Systems, Inc. (E-mail this company)

June 2014 - (Free Research)
Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions – and the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

3 Compelling Reasons to Consider Desktop Virtualization by VMware, Inc.

March 2014 - (Free Research)
Check out this informative resource to discover how VDI can help your organization provide access to corporate data and applications from any device, without sacrificing IT control. 
(WHITE PAPER) READ ABSTRACT |

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008 by Microsoft

December 2008 - (Free Research)
This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 418 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts