Access DevicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Access Devices returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Endpoint Security
 •   Network Security
 •   Data Security
 •   Wireless Security
 •   Access Control
 •   Virtualization
 •   Network Management
 •   Application Security

Related Searches
 •   Access Benefits
 •   Access Devices Database
 •   Access Devices Outsourcing
 •   Basics Of Access Devices
 •   Portals Access Devices
 •   Production Access Devices
 •   Reservation Access
 •   Resources Access Devices
 •   Technologies Access Devices
 •   Tutorial Access Devices
Advertisement

ALL RESULTS
1 - 25 of 438 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

AGL Resources Relies on F5 Products for Application Traffic Management, Link Load Balancing and Secure Remote Access by F5 Networks, Inc.

December 01, 2004 - (Free Research)
AGL Resources, an Atlanta-based energy services holding company, relies on four different F5 products to support their growing infrastructure investments and to improve their ROI. 
(CASE STUDY) READ ABSTRACT |

Centralized Management Key to Controlling Mobile Communications Cost by Digital Fairway, Inc.

November 2007 - (Free Research)
In this paper, learn why centralized policy management, automated order processing and asset management, and end-user self-service are key ingredients for any organization trying to control the proliferation of wireless mobile devices and spiraling costs. 
(WHITE PAPER) READ ABSTRACT |

HP Virtual Desktop Infrastructure with VMware View: Bring the benefits of industry-standard servers to your desktop environment by HP, Vmware and AMD

January 2009 - (Free Research)
This solution provides a centralized approach to managing your desktop environment and protecting the information within it. It brings the far-reaching benefits of industry-standard servers and shared storage to your desktop environment, while delivering a full virtual PC experience. 
(BROCHURE) READ ABSTRACT |

Virtualized Client Solutions: HP Remote Client Solutions (RCS) by Hewlett-Packard Company

August 2008 - (Free Research)
HP offers client virtualization under its HP Remote Client Solutions (RCS) portfolio, andit includes virtualized client solutions like thin clients blade PCs, blade workstations, VDI and server-based computing. 
(DATA SHEET) READ ABSTRACT |

Automated Storage Optimization for z/OS Mainframes by CA Technologies.

August 2007 - (Free Research)
In this paper learn about how the CA Automated Storage Optimization Mainframe Suite is flexible and modular so there is no need to "rip and replace" as processes, applications and users are added while the value of information evolves. 
(WHITE PAPER) READ ABSTRACT |

BYOD: Device Freedom Without Compromising the IT Network by Cisco (E-mail this company)

May 2013 - (Free Research)
Uncover the drivers, benefits, and challenges of Bring Your Own Device (BYOD) and learn how – with the right solution – you can keep your employees happy and organisation safe at the same time. 
(WHITE PAPER) READ ABSTRACT |

B.Y.O.D Without the Risk by Juniper Networks, Inc.

June 2012 - (Free Research)
As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable. 
(WHITE PAPER) READ ABSTRACT |

Browser based access to Windows applications and desktops – AccessNow by Ericom by Ericom Software

October 2011 - (Free Research)
Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Consumerization of IT: Security Challenges of the New World Order by CA Technologies.

May 2012 - (Free Research)
Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them. 
(WHITE PAPER) READ ABSTRACT |

Honey Stick Report Results by Symantec Corporation

April 2012 - (Free Research)
The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Security: Device Control and Application Control by Lumension

September 2010 - (Free Research)
The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection. 
(TRIAL SOFTWARE)

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Cisco Any Device: Planning a Productive, Secure and Competitive Future by Cisco (E-mail this company)

August 2011 - (Free Research)
Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Wireless LAN access control: Managing users and their devices by Aerohive Networks

July 2011 - (Free Research)
This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions. 
(EGUIDE) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2013 - (Free Research)
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met. 
(WHITE PAPER) READ ABSTRACT |

Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0 by Aerohive Networks

July 2011 - (Free Research)
Mobile devices give workers the ability to access critical information anytime, anywhere. Despite the obvious benefits for productivity, network accessibility has also become a serious security concern – especially in the healthcare community. Learn about a cloud-enabled network security approach that helps safeguard confidential patient data. 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified Access Technology Overview: Converged Access by Cisco (E-mail this company)

January 2013 - (Free Research)
Read this white paper to learn about a strategy that could help you manage the growth of mobile devices and traffic effectively, as well as make your business faster, more efficient, and more connected than ever before. 
(WHITE PAPER) READ ABSTRACT |

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely by Cisco (E-mail this company)

June 2011 - (Free Research)
Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management. 
(WHITE PAPER) READ ABSTRACT |

Securing mobile device in the business environment by IBM

February 2014 - (Free Research)
This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value. 
(WHITE PAPER) READ ABSTRACT |

UK College Embraces BYOD and Cuts IT Spend by Dell, Inc.

October 2013 - (Free Research)
This white paper features a case study on a UK college that enhanced its virtual infrastructure to ensure high speed and easy management, allowing students and staff to have better access to the network from their personal devices. 
(WHITE PAPER) READ ABSTRACT |

Next-generation Firewalls Enable Secure Mobile Network Access by Palo Alto Networks

December 2013 - (Free Research)
Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose. 
(WHITE PAPER) READ ABSTRACT |

The Critical Need for Edge Data Protection with Security, Access, and Control by CommVault Systems, Inc.

October 2013 - (Free Research)
In this white paper, the challenges associated with safeguarding data and opening up universal access for distributed desktop and laptop systems residing at the edge of an organization's IT infrastructure are examined. 
(WHITE PAPER) READ ABSTRACT |

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008 by Microsoft

December 2008 - (Free Research)
This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 438 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts