Active PosWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Active Pos returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Systems Management
 •   Network Management
 •   Data Center Management
 •   Data Security
 •   Backup Systems and Services
 •   Identity Management/ User Provisioning
 •   Disaster Recovery
 •   Authentication / Password Management
 •   Directory Servers
 •   Network Security

Related Searches
 •   Active Pos New Hampshire
 •   Active Rfi
 •   Active Statements
 •   Definitions Active Pos
 •   Designer Active
 •   Display Active Pos
 •   Improve Active Pos
 •   Learn About Active Pos
 •   Project Active
 •   Server Active Pos
Advertisement

ALL RESULTS
1 - 25 of 296 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Lowering the Point of Sale System Support Costs with Intel® vPro™ Technology by Wipro Technologies

February 06, 2009 - (Free Research)
Written for retail IT organizations managing Point of Sale (POS) systems, this paper shows hard dollar savings that retailers can expect to see by adopting advanced POS systems with Intel® vPro™ technology. 
(ARTICLE) READ ABSTRACT |

Post-Migration Best Practices: Exchange Environment Operation by Dell Software

April 11, 2011 - (Free Research)
In this Quest white paper, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post-migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration management you must know. 
(WHITE PAPER) READ ABSTRACT |

Attacks on Point of Sales Systems by Symantec Corporation

March 11, 2014 - (Free Research)
Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS. 
(WHITE PAPER) READ ABSTRACT |

Tablets: Accelerate Performance and Increase Mobility by Dell, Inc.

October 16, 2013 - (Free Research)
The mobile device revolution in business shows no sign of slowing down. This interesting webcast looks at how the savvy business is taking a pro-active stance by increasing and encouraging the use of tablets as companion to the traditional desktop, one that has the power to handle complex Exchange type applications. 
(WEBCAST) READ ABSTRACT |

Paramount Foods Upgrades Store Technology by Hewlett-Packard Company

March 2008 - (Free Research)
Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

HP POS System Helps Mayors Improve Customer Service, Gain Selling Time by Hewlett-Packard Company

August 2008 - (Free Research)
Among the priorities for the new system were ease of use by salespeople, an easy-to-manage centralized customer database for lookup and validation, and the use of broadband connectivity. Maintaining access to proprietary applications that supported nonsales functions was also required. 
(CASE STUDY) READ ABSTRACT |

Fair exchange protocols with anonymity and non-repudiation for payments by ComputerWeekly.com

May 2013 - (Free Research)
This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Active Directory Expert Best Practices and Security Tips by Centrify Corporation

December 2012 - (Free Research)
Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more. 
(EGUIDE) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Ensuring High Availability for Active Directory by Dell Software

September 2010 - (Free Research)
Every Active Directory administrator will agree that the health stability and recoverability of Active Directory is essential for the enterprise. If Active Directory fails, even in the slightest manner, one or all of the services and communications with Active Directory can also fail. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Top 12 Most Difficult Active Directory Management Tasks by Dell Software

October 2008 - (Free Research)
This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier. 
(WHITE PAPER) READ ABSTRACT |

Active Administrator™, Version 5.6.1 by ScriptLogic Corporation

December 2010 - (Free Research)
Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Seven Common Challenges of Administering Active Directory by NetIQ Europe

May 2011 - (Free Research)
This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Integrating Mac OS X into Active Directory by CDW

April 2010 - (Free Research)
Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment. 
(VIDEOCAST) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools? by Dell Software

October 2009 - (Free Research)
Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects. 
(WHITE PAPER) READ ABSTRACT |

Driving Your Channel Business: Leverage Information Technology to Improve Partner Relationships and Boost Channel Performance by SAP AG

September 2008 - (Free Research)
This white paper discusses key channel business trends, highlights the complexities and challenges of different channel models. 
(WHITE PAPER) READ ABSTRACT |

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

Active Directory Auditing: What It Is, and What It Isn’t by Dell Software

February 2013 - (Free Research)
This white paper discusses the problems that stem from Active Directory (AD) native audit loggings, the functionalities you really need from your AD auditing solution for efficient management. 
(WHITE PAPER) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

Using Microsoft Active Directory in the Domino World by PistolStar, Inc.

February 2009 - (Free Research)
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point. 
(WHITE PAPER) READ ABSTRACT |

Implementing an IT energy management plan for real savings by IBM

November 2010 - (Free Research)
This white paper will help you understand the functionality included with Active Energy Manager and assist you in developing a plan to unleash the potential of an energy-optimised data center. 
(WHITE PAPER) READ ABSTRACT |

Detecting Zero-Day Exploits in the Wild by Websense

March 2014 - (Free Research)
This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Dell Software

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 296 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts