Desktop Corporate Compliance OfficersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Desktop Corporate Compliance Officers returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Desktop Management
 •   Endpoint Security
 •   Wireless Security
 •   Mobile Device Management

Related Searches
 •   Access Desktop
 •   Costs Desktop Corporate
 •   Desktop Corporate Compliance Demos
 •   Desktop Corporate Compliance Reseller
 •   Desktop Corporate Compliance Rfq
 •   Desktop Corporate Processing
 •   Desktop Tennessee
 •   Strategy Desktop Corporate
 •   Technical Desktop Corporate
 •   Use Desktop Corporate
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

2012 Security Outlook by ComputerWeekly.com

February 24, 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know by IBM

August 24, 2011 - (Free Research)
Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data. 
(EGUIDE) READ ABSTRACT |

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication by i365, makers of Evault

June 30, 2009 - (Free Research)
Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers. 
(CASE STUDY) READ ABSTRACT |

Privilege Made Simple: Privilege Identity Management (PIM) Demystified by BeyondTrust Corporation

March 26, 2010 - (Free Research)
This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Citrix and Intel Deliver Client Virtualization by Citrix

June 09, 2010 - (Free Research)
Citrix and Intel worked together to deliver local virtual machine desktops, aiming to make virtualization ubiquitous on client devices. The result of the collaboration is Citrix® XenClient™, a local desktop virtualization platform that provides new levels of security and user flexibility for enterprise desktops. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 26, 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Windows 7 and Desktop Lockdown with Privilege Management by Viewfinity

November 03, 2010 - (Free Research)
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments. 
(WHITE PAPER) READ ABSTRACT |

Do Mobile Users Need Full Desktop Access? by VMware, Inc.

August 02, 2013 - (Free Research)
In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future. 
(EGUIDE) READ ABSTRACT |

Best Practices for Managing the Increasing Depth of Compliance Regulation by IBM

May 18, 2011 - (Free Research)
According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations. 
(EGUIDE) READ ABSTRACT |

Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by Hewlett-Packard Company

July 21, 2009 - (Free Research)
Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Three actions to support governance as business gets social by ComputerWeekly.com

March 31, 2011 - (Free Research)
While businesses are seeing the value of becoming more open through social collaboration, there is a tightening of regulations impacting corporate governance and, subsequently, IT governance. 
(WHITE PAPER) READ ABSTRACT |

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Building a Best-Run Finance Organization by SAP America, Inc.

June 2008 - (Free Research)
This SAP Executive Insight examines the changing role of the finance organization in today's business environment. Further, it describes how companies can develop best-run finance organizations. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

The CIO's Guide to Mobile Security by BlackBerry

October 2006 - (Free Research)
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Five Best Practices for Protecting Backup Data by Iron Mountain.

June 2010 - (Free Research)
Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them. 
(WHITE PAPER) READ ABSTRACT |

Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution by Citrix Online - GotoMyPC

January 2004 - (Free Research)
Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely. 
(CASE STUDY) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization: Overcoming five real-world challenges by Citrix

April 2009 - (Free Research)
Success with server virtualization is leading many firms to explore the next frontier - virtualizing employee desktops. The opportunities are significant, but so are the challenges, both technical and psychological. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts