Devices SurveyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Devices Survey returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Endpoint Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Virtualization
 •   Wireless Security

Related Searches
 •   Cycle Devices
 •   Devices Contacts
 •   Devices Survey Chart
 •   Devices Survey Supplier
 •   Devices Survey Utility
 •   History Devices
 •   Portal Devices
 •   Search Devices Survey
 •   Standards Devices Survey
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Plantronics UC Toolkit Evolve Survey by Plantronics

April 28, 2011 - (Free Research)
After you’ve implemented and optimized your UC audio devices, it’s essential to make sure your end users are satisfied with their equipment.  This survey provides a list of suggested questions IT managers can use to get feedback from their users regarding user utilization, services and upgrades. 
(WHITE PAPER) READ ABSTRACT |

Yankee Group Report: Mobility Survey by Juniper Networks, Inc.

May 20, 2011 - (Free Research)
Although productivity can be hard to come by in both mobile and non-mobile environments, results from Yankee Group’s Anywhere Enterprise: 2010 U.S. Enterprise Mobility/Empowered Employee Survey, Wave 1-2 reveal the right mobile technologies provided to the right employee segments can produce a substantial uplift in productivity. 
(WHITE PAPER) READ ABSTRACT |

vokeStream Market Snapshot: Automated Testing of Networks and Connected Devices by Fanfare

November 16, 2007 - (Free Research)
Service providers and network equipment manufacturers are adding automation to their pre-production testing process for a combination of reasons. This Market Snapshot will focus on the need for test automation of networks and connected devices, identify a path to automation adoption and provide an overview of the market. 
(ANALYST REPORT) READ ABSTRACT |

Storage Magazine Online November 2012 – Storage Salary Survey Results Revealed by SearchStorage.com

November 01, 2012 - (Free Research)
In the November 2012 Storage Magazine, find the results of this year’s annual Storage Salary Survey and find expert articles from Rich Castagna, Jon Toigo, Terri McClure and others addressing BYOD, storage clouds, LTFS, NAS upgrades and much more. 
(EZINE) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 31, 2012 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 31, 2010 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 31, 2010 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

How Can You Prepare for the Consumerization of IT by DynTek & McAfee

March 10, 2011 - (Free Research)
The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention Survey by Symantec Corporation

April 02, 2009 - (Free Research)
Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways. 
(ASSESSMENT TOOL)

AT&T Brings Consumers Closer to Their Favorite Musicians with Red Light Management by AT&T Corp

November 02, 2011 - (Free Research)
This brief white paper examines the business benefits associated with promotional marketing campaigns aimed at barcode scanning via consumer mobile devices. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 11, 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This informative whitepaper explores the role of network security in an increasingly mobile workplace and what you can do to enhance employee productivity. 
(WHITE PAPER) READ ABSTRACT |

Cisco Mobile Security Survey: Research Highlights by Cisco Systems, Inc.

August 31, 2013 - (Free Research)
Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Report 2009 by McAfee, Inc.

December 07, 2009 - (Free Research)
Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly Buyer's Guide to Mobile Device Management by TechTarget

March 18, 2014 - (Free Research)
The trend for consumerisation and employees using their own devices for work comes as concerns over data security mount. In this 11-page buyer's guide, Computer Weekly examines how to formulate a strategic policy for mobile device management (MDM), and how to choose the right MDM approach and product portfolio for your organization. 
(RESOURCE)

Evaluating Mobile Device Management Products by TechTarget

March 18, 2014 - (Free Research)
With new mobile devices emerging in the marketplace, MDM also needs to evolve to keep pace. But with an excess of products to choose from, deploying the best MDM software to monitor your mobile workforce can be cumbersome. This guide examines the capabilities of modern MDM products and analyzes tools that help meet workforce requirements. 
(RESOURCE)

Getting a better grip on mobile devices by IBM

March 14, 2013 - (Free Research)
Read this whitepaper and learn how to unlock the business opportunities that BYOD has to offer through proper mobile device management. Get tips on managing mobile applications, implementing management technology, creating a BYOD plan, and more. 
(WHITE PAPER) READ ABSTRACT |

Ponemon Global Study on Mobility Risks by Websense, Inc.

February 01, 2012 - (Free Research)
With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them. 
(WHITE PAPER) READ ABSTRACT |

2010 Annual Study: U.S. Enterprise Encryption Trends by Symantec Corporation

December 03, 2010 - (Free Research)
This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more. 
(WHITE PAPER) READ ABSTRACT |

BYOD and Beyond: How To Turn BYOD into Productivity by Aerohive Networks

July 16, 2012 - (Free Research)
This paper outlines the connectivity and productivity requirements you need to ensure your network is truly prepared to handle the onslaught of today's mobile devices. Read on to learn details on the necessary access, authentication and security options as well as the features required to ensure your network is ready to make every device compliant. 
(WHITE PAPER) READ ABSTRACT |

Making the Most of BYOD Opportunities by Dell and VMware

April 30, 2013 - (Free Research)
Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity. 
(WHITE PAPER) READ ABSTRACT |

Mobile: The Technology Game-Changer in 2013 by Webroot

February 28, 2013 - (Free Research)
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization. 
(EGUIDE) READ ABSTRACT |

The Move Toward IT Service Management (ITSM) Mobilization by BlackBerry

February 17, 2010 - (Free Research)
IDG Research Services recently surveyed more than 200 CIOs and senior IT and business executives at companies of all sizes to examine the benefits of giving employees mobile access to strategic business applications, including ITSM applications. This analyst report discusses the benefits of ITSM mobilization and key findings from the IDG survey. 
(ANALYST REPORT) READ ABSTRACT |

New Insider Threat Emerges in the New Economy by Lumension

February 02, 2009 - (Free Research)
Learn how employees and partners are engaging with IT assets and intellectual property. 
(WHITE PAPER) READ ABSTRACT |

10 best practice suggestions for common smartphone threats by Dell SecureWorks UK

August 31, 2011 - (Free Research)
Mobile devices have introduced a whole new set of risks into enterprise security, and IT teams need strategies to protect against them. Read this paper to uncover 10 of the most common threats associated with smartphones and mobile devices, along with best practices to help mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts