Device DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Data returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Data Security
 •   Endpoint Security
 •   Wireless Security
 •   Data Center Management
 •   Network Security
 •   Virtualization
 •   Security Monitoring
 •   Application Management and Maintenance

Related Searches
 •   Configure Device Data
 •   Contacts Device
 •   Crm Device Data
 •   Device Data Best
 •   Device Data Conversions
 •   Device Top
 •   Device Vendor
 •   Formats Device
 •   Project Device
 •   Publishing Device
Advertisement

ALL RESULTS
1 - 25 of 410 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network by SearchMobileComputing

December 2008 - (Free Research)
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware. 
(EBOOK) READ ABSTRACT |

What’s the Best Focus for MDM Strategy Now? by SearchSecurity.com

March 2014 - (Free Research)
This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters. 
(EBOOK) READ ABSTRACT |

Strategy for Securing Mobile Content - 5 Key Guidelines by Accellion, Inc.

June 2013 - (Free Research)
Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security. 
(WHITE PAPER) READ ABSTRACT |

Smart Devices, Smart Security by Voltage Security, Inc.

July 2012 - (Free Research)
This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Windows Mobile Netbook for the Enterprise with Low TCO by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
The Windows Mobile smartphone is easily deployed with a wide array of productivity tools allowing the mobile user to quickly respond to customer requests, stay up-to-date on the latest company information or access remote desktops. 
(WHITE PAPER) READ ABSTRACT |

Enhancing End-to-End Cloud Security: Part 3 by McAfee, Inc.

September 2013 - (Free Research)
This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security. 
(WEBCAST) READ ABSTRACT |

Get Smart About Big Data by CommVault Systems, Inc.

February 2014 - (Free Research)
This white paper to get more information on a solution that can help you extract maximum value from your information by converging backup and archiving. 
(WHITE PAPER) READ ABSTRACT |

Importance of Web Application Firewall Technology for Protecting Web-based Resources by Imperva

April 2008 - (Free Research)
ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources. 
(WHITE PAPER) READ ABSTRACT |

Symantec Intelligence Report - August 2013 by Symantec Corporation

August 2013 - (Free Research)
In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future. 
(WHITE PAPER) READ ABSTRACT |

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

On-the-Go BI: Deliver Results from Anywhere by SAP America, Inc.

December 2012 - (Free Research)
To make faster decisions wherever they are, mobile workers need business intelligence (BI) and analytics capabilities from anywhere. In this resource, explore how you can take BI on the road and enable your mobile workforce to view and search reports from mobile devices with real-time analytics. 
(WHITE PAPER) READ ABSTRACT |

Mobile Analytics for On-the-Go Decisions by SAP America, Inc.

October 2013 - (Free Research)
In this brief video, explore how you can make intelligent decisions on the go with mobile applications and devices. Learn from a variety of use cases how you implement mobile applications in your enterprise. 
(VIDEO) READ ABSTRACT |

Expert Guide to Securing Emerging Endpoints by Sophos, Inc.

February 2011 - (Free Research)
Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints. 
(EGUIDE) READ ABSTRACT |

Modern Infrastructure: November 2012 by Dell and VMware

November 2012 - (Free Research)
November's edition of Modern Infrastructure e-zine offers advice on the current trends in the modernized data center including information on migrating legacy applications, advanced public cloud offerings, BYOD, and software-defined networking. 
(EZINE) READ ABSTRACT |

Modern Infrastructure: November 2012 by SearchDataCenter.com

November 2012 - (Free Research)
This second issue of the Mi E-zine continues with its strategy of not just supporting IT pros, like you, as you make infrastructure purchasing decisions, but on providing vendor-neutral advice on the infrastructure you can – and can't – get away with NOT purchasing. 
(EZINE) READ ABSTRACT |

Webroot  Endpoint Security eBook by Webroot

July 2012 - (Free Research)
This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security. 
(EBOOK) READ ABSTRACT |

Ten Ways the IT Department Enables Cybercrime by Kaspersky Lab

February 2011 - (Free Research)
In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them. 
(WHITE PAPER) READ ABSTRACT |

Modern Infrastructure: November 2012 by CA Technologies.

November 2012 - (Free Research)
November's edition of Modern Infrastructure e-zine offers advice on the current trends in the modernized data center including information on migrating legacy applications, advanced public cloud offerings, BYOD, and software-defined networking. 
(EZINE) READ ABSTRACT |

The Enterprise Archive Defined by Permabit Technology Corporation

February 2008 - (Free Research)
The objective of archiving is to gain cost and operational efficiencies while reliably protecting information for the long-term. 
(WHITE PAPER) READ ABSTRACT |

Windows Server and Storage eBook, Ch 3 - Assess Your Data Center Storage Needs by Dell, Inc. and Intel®

August 2009 - (Free Research)
Servers play a crucial role in daily enterprise operations. But even the most powerful and resilient servers are useless without adequate storage. Storage solutions contain the operating systems, applications and virtual images needed to operate every server. This eBook chapter will help you better understand your data center storage challenges. 
(EBOOK)

Enhanced Wi-Fi Companion: A Complete Wi-Fi Solution for Business Mobility by ComputerWeekly.com

June 2010 - (Free Research)
Businesses that want to deploy Pocket PCs or other Windows Mobile/CE based devices on their Wi-Fi networks will benefit from a solution that incorporates the latest data security and Wi-Fi innovations, CCX certification, and a user-friendly interface in a single, complete solution without third-party supplicants. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Mobile endpoint security and management - Best practices by Kaseya

May 2011 - (Free Research)
In this e-guide, uncover the challenges associated with selecting a data protection plan for your channel business as well as best practices you should consider in helping you through the process. 
(EGUIDE) READ ABSTRACT |

Five Ways to Address the Challenges of Data Delivery in a Mobile Environment by TIBCO Software Inc.

February 2014 - (Free Research)
To truly embrace mobility, businesses need to communicate with all kinds of devices, regardless of model or age. In this solution brief, explore five principles that will help you address the challenges of exchanging data in real-time with mobile devices. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 410 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts