Desktop Security Vs RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Desktop Security Vs Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Desktop Management
 •   Virtualization
 •   Desktops/ Workstations
 •   Data Security
 •   Endpoint Security
 •   Enterprise Systems Management
 •   Network Security
 •   Data Center Management
 •   Mobile Device Management
 •   Application Management and Maintenance

Related Searches
 •   Configurations Desktop
 •   Desktop Framework
 •   Desktop Intranet
 •   Desktop Security Device
 •   Desktop Security Vs Training
 •   Desktop Security Vs Utility
 •   Desktop Security Wyoming
 •   Desktop Software
 •   Enterprise Desktop Security Vs
 •   Schema Desktop
Advertisement

ALL RESULTS
1 - 25 of 431 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Building a Secure and Compliant Windows Desktop by BeyondTrust Corporation

May 2008 - (Free Research)
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights. 
(WHITE PAPER) READ ABSTRACT |

How to Make Virtual Desktop Security Simpler and More Scalable by Citrix

April 2011 - (Free Research)
It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users. 
(WEBCAST) READ ABSTRACT |

Make Virtual Desktop Security Simpler and More Scalable by Citrix

May 2011 - (Free Research)
Virtualization calls for new security strategies that integrate user profile information, location, and other relevant data. But many companies are unsure how they can adapt their approach accordingly. Develop a deeper understanding of the malware landscape so you can empower end users and protect your organization against potential threats. 
(IT BRIEFING) READ ABSTRACT |

IT Decision Checklist: Virtual Desktop Infrastructure Security by Trend Micro

November 2010 - (Free Research)
Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security by Faronics

January 2010 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How Application Whitelisting Can Increase Your Desktop Security by Faronics

November 2009 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus. 
(WEBCAST) READ ABSTRACT |

The Evolving Landscape of Desktop Security by McAfee, Inc.

May 2013 - (Free Research)
This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know by IBM

August 2011 - (Free Research)
Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data. 
(EGUIDE) READ ABSTRACT |

The Future of Desktop Computing: Preparing for effective desktop delivery in the post PC-era by SearchDataCenter.com

July 2013 - (Free Research)
Leading industry experts Gabe Knuth and Brian Madden dig into the real future of the desktop. Gain insight into the challenges Windows 8 presents in end user satisfaction, what our future desktops will look like, and how the consumerization of IT will blur the lines for desktop admins. 
(EGUIDE) READ ABSTRACT |

Desktop Virtualization with Citrix XenDesktop - 3 Easy Steps to a Better Desktop by Citrix

December 2008 - (Free Research)
The complexity and cost of running and maintaining the desktop has reached new heights in today's progressively mobile and global business environment. In this paper, we'll take a look at the factors that are changing the world of the desktop and rendering traditional desktop lifecycle management obsolete. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

Dell DVS Enterprise - Mobile Secure Desktop by Dell and VMware

June 2013 - (Free Research)
This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device. 
(WHITE PAPER) READ ABSTRACT |

Reduce Your TCO with Automated Workspace Management by RES Software

February 2010 - (Free Research)
This white paper examines how to use automated workspace management products to reduce PC TCO by at least $197 per PC per year while maintaining end-user productivity. 
(WHITE PAPER) READ ABSTRACT |

2012 Bit9 Cyber Security Research Report by Bit9, Inc.

May 2012 - (Free Research)
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers. 
(WHITE PAPER) READ ABSTRACT |

Winton Woods City Schools launches virtual desktop infrastructure by Dell, Inc.

March 2012 - (Free Research)
Read this to learn why Winton Woods City Schools deployed Windows Thin PC operating system to create a network-deployable image, and is using out-of-warranty machines and donated hardware. Learn more about the many benefits, including expected reduction of power bills, about 10 to 20% savings of new disk purchases with thin provisioning and more. 
(CASE STUDY) READ ABSTRACT |

Endpoint Protection Small Business Edition by Symantec Corporation

September 2012 - (Free Research)
Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses. 
(VIDEO) READ ABSTRACT |

HP Mobile Application Security by Hewlett-Packard Company

August 2012 - (Free Research)
Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now. 
(WEBCAST) READ ABSTRACT |

The Desktop Dilemma: Liberty vs. Lockdown by Bit9, Inc.

June 2009 - (Free Research)
CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment. 
(WHITE PAPER) READ ABSTRACT |

Zero Client vs. Thin Client Computing by Dell and VMware

June 2013 - (Free Research)
This expert guide puts zero clients and thin clients head-to-head comparing capabilities, system requirements, benefits and drawbacks. 
(EGUIDE) READ ABSTRACT |

Trend Micro Deep Security 7.5 vs. McAfee and Symantec by Trend Micro, Inc.

February 2011 - (Free Research)
Server and desktop virtualization are essential elements of any IT strategy that seeks to decrease capital and operational expenditures. In the rush to implement virtualization technologies, many organizations simply deploy the same anti-virus solution that is in use on their physical server and desktop systems. 
(TEST RESULTS) READ ABSTRACT |

E-Guide: VDI Hardware Comparison: Thin vs. Thick vs. Zero Clients by Dell and VMware

June 2013 - (Free Research)
This expert guide from SearchVirtualDesktop.com compares thin clients, fat clients and zero clients to help you learn how these endpoint devices for VDI differ and establish a blueprint for your desktop virtualization strategy. 
(EGUIDE) READ ABSTRACT |

Security Vs. Flexibility: Must IT Management Choose? by Faronics

August 2008 - (Free Research)
This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Personal vs Shared VDI Images by Pano Logic, Inc

December 2010 - (Free Research)
For about as long as VDI had been around, the discussion over the merits of shared and personal images has persisted. In this transcript of the "Personal vs Shared VDI Images" webcast, Brian Madden and Gabe Knuth will take a look at the merits and drawbacks of each approach in an effort to give the viewer a clear path for implementation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers by Trend Micro

December 2013 - (Free Research)
In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 431 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts