Device BasedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Based returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Storage Security
 •   Data Security
 •   Endpoint Security
 •   Disk-based Backup & Storage/ RAID
 •   Managed Security Services
 •   Content Delivery Networks/ Web Application Acceleration
 •   Wireless Security
 •   Application Management and Maintenance

Related Searches
 •   About Device Based
 •   Crm Device Based
 •   Device Based Measurement
 •   Device Based Requirement
 •   Device Basic
 •   Device Billing
 •   Device Providers
 •   Knowledge Device Based
 •   Make Device
Advertisement

ALL RESULTS
1 - 25 of 442 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Reducing the Cost of Electronic Gaming Machine Support with Intel® vPro™ Technology by Wipro Technologies

February 06, 2009 - (Free Research)
This paper illustrates the expected cost savings of deploying this technology to support electronic gaming operations. 
(ARTICLE) READ ABSTRACT |

User-Based Licensing for Endpoint Protection and BYOD by Webroot

June 11, 2013 - (Free Research)
User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization. 
(WHITE PAPER) READ ABSTRACT |

Solid State Storage - A New Standard for Enterprise-Class Reliability by Fusion-IO

February 16, 2009 - (Free Research)
With throughput and seek times faster than disk arrays, data centers are including NAND flash as part of their server infrastructure. Fusion-io offers solid state storage solutions with NAND flash that provides integrity for data exceeding today's solid state storage solutions and surpasses enterprise-class rotating magnetic storage devices. 
(WHITE PAPER) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 30, 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

Browser based access to Windows applications and desktops – AccessNow by Ericom by Ericom Software

October 28, 2011 - (Free Research)
Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device. 
(TRIAL SOFTWARE) READ ABSTRACT |

Still Using Proxies for URL Filtering? There's a Better Way by Palo Alto Networks

March 18, 2014 - (Free Research)
This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer. 
(WHITE PAPER) READ ABSTRACT |

Panda Cloud Systems Management: Remote Support Datasheet by Panda Security

July 16, 2013 - (Free Research)
This exclusive white paper discusses a cloud-based device management solution that lets IT remotely connect to devices, even if they are switched off, and run diagnostics to resolve issues transparently for users. 
(WHITE PAPER) READ ABSTRACT |

Mobilizing Windows applications by Citrix

June 12, 2013 - (Free Research)
This exclusive resource constructs and demonstrates an efficient way of delivering Windows-based applications designed for the latest mobile devices without time-consuming and costly rewrites, all while maintaining information security best practices. 
(WHITE PAPER) READ ABSTRACT |

NAC at the Endpoint: Control Your Network through Device Compliance by Sophos, Inc.

July 2008 - (Free Research)
Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices. 
(WHITE PAPER) READ ABSTRACT |

Real-time Mobile Apps Boost Workforce Productivity by AT&T Corp

October 2011 - (Free Research)
This paper shows ways to combine mobile devices with a robust wireless network and complementary Software-as-a-Service (SaaS)-based offerings that will allow you to choose applications that fit your needs, empowering your workers to make efficient use of time in the field. 
(WHITE PAPER) READ ABSTRACT |

Discovering Novell ZENworks 11 by Novell, Inc.

November 2010 - (Free Research)
Novell is taking its family of systems-management products to the next level with ZENworks 11—by integrating them all into a single policy-based platform; providing unified management for a wider range of Windows and Linux devices; and making it easy to extend automated device management across physical, virtual and cloud environ­ments. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop by VMware, Inc.

August 2012 - (Free Research)
This webcast explores the issues with enabling BYOD in the workplace and provides details of a desktop virtualization-based solution that will help you securely support device diversity, mobile workers, and BYOD initiatives. 
(WEBCAST) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

Lumension Sanctuary Device Control by Lumension

February 2009 - (Free Research)
Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints. 
(TRIAL SOFTWARE)

Handbook: Architecting the cloud for mobile services by SearchNetworking.com

August 2013 - (Free Research)
This handbook will offer information on new cloud-based mobile services and provide guidance on architecting the cloud for mobile device management (MDM), location-based services and security requirements. We will also address managing the network to minimize problems in application performance and delivery. 
(EGUIDE) READ ABSTRACT |

Taking Windows Mobile on Any Device by Citrix

January 2014 - (Free Research)
This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

Mobilizing Windows Applications by Citrix

August 2013 - (Free Research)
Read this whitepaper to discover a solution architecture that allows for the efficient delivery of Windows-based applications. 
(WHITE PAPER) READ ABSTRACT |

June Information Security Magazine by SearchSecurity.com

June 2013 - (Free Research)
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP. 
(EZINE) READ ABSTRACT |

Comparing iSCSI Initiator Implementations by Dell, Inc.

July 2008 - (Free Research)
With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel-but at a fraction of the cost. 
(WHITE PAPER) READ ABSTRACT |

BlackBerry Java® Application Location-based Services Development Guide by BlackBerry

June 2010 - (Free Research)
Access this development guide to learn about location-based services on for BlackBerry Java Applications. This guide will cover: GPS overview, specifying the GPS mode, retrieving a location provider, retrieving the location of a BlackBerry device and geocoding and reverse geocoding. 
(EGUIDE)

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Panda Cloud Systems Management: Partners and Administrator's Guide by Panda Security

July 2013 - (Free Research)
This crucial resource takes an in-depth look at a cloud-based remote device monitoring and management solution that offers high-quality service while promoting task automation to increase efficiency. 
(WHITE PAPER) READ ABSTRACT |

Stop Losing Sleep Over Mobile Video. by Limelight Networks, Inc.

April 2014 - (Free Research)
The following white paper explores a content delivery solution that can seamlessly deliver video to virtually any mobile device with the use of adaptive streaming. Get a firsthand look at how you can offload the complexities of multi-device, multi-format delivery, how to deliver content everywhere, and more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 442 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts