Documents Buying Privileged DesktopWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Documents Buying Privileged Desktop returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Identity Management/ User Provisioning
 •   Desktop Management
 •   Access Control
 •   Data Security
 •   Network Security
 •   Authentication / Password Management
 •   Security Monitoring
 •   Endpoint Security
 •   Desktops/ Workstations

Related Searches
 •   Databases Documents Buying Privileged
 •   Documents Buying Privileged Developments
 •   Documents Buying Privileged Resources
 •   Documents International
 •   Reviews Documents Buying Privileged
 •   Technology Documents
 •   Vendors Documents Buying
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 13, 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

Windows 7 and Desktop Lockdown with Privilege Management by Viewfinity

November 03, 2010 - (Free Research)
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments. 
(WHITE PAPER) READ ABSTRACT |

Privilege Made Simple: Privilege Identity Management (PIM) Demystified by BeyondTrust Corporation

March 26, 2010 - (Free Research)
This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Building a Secure and Compliant Windows Desktop by BeyondTrust Corporation

May 2008 - (Free Research)
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Dilemma: Liberty vs. Lockdown by Bit9, Inc.

June 2009 - (Free Research)
CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment. 
(WHITE PAPER) READ ABSTRACT |

Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment by Wanova, Inc.

September 2010 - (Free Research)
This white paper surveys existing and emerging approaches to desktop management in the enterprise, covering both traditional systems management methods, as well as newer desktop virtualization technologies. We will discuss their advantages and shortcomings of each approach. 
(WHITE PAPER) READ ABSTRACT |

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints by Viewfinity

December 2011 - (Free Research)
Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization by AppSense

July 2013 - (Free Research)
In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution. 
(CASE STUDY) READ ABSTRACT |

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by Bit9, Inc.

June 2009 - (Free Research)
Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment. 
(WHITE PAPER) READ ABSTRACT |

Desktops: Corporate IT Buying Behavior & Customer Satisfaction Survey by Dell, Inc. and Intel®

June 2009 - (Free Research)
This Technology Business Research (TBR) study examines the results of the corporate desktop satisfaction competition for Q1 of 2009, for which Dell ranked in the top position. Read this to learn about each brand's competitive strengths, weaknesses, challenges, and overall satisfaction rankings. 
(ANALYST REPORT) READ ABSTRACT |

VMware ThinApp: Run Any Version of Any App on a Single OS Without Any Conflict by VMware, Inc.

December 2008 - (Free Research)
Find out how VMware ThinApp, the leading desktop virtualization solution, enables agentless application virtualization for accelerated software development and desktop deployment. With ThinApp, you can run any version of any application. 
(WHITE PAPER) READ ABSTRACT |

Exploring the Future of Desktop Virtualization Chapter 3: About to Buy Guide: Thin Clients by SearchVirtualDesktop.com

May 2013 - (Free Research)
This expert resource discusses the value of thin clients in a virtual desktop environment, as well as how you can find the right solution that satisfies your specific requirements. 
(EBOOK) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Most common VDI Myths you shouldn’t buy into by VCE (E-mail this company)

February 2012 - (Free Research)
VDI isn’t a cure-all for desktop management problems, though many desktop virtualization vendors would have you think so. In this eguide, our team of experts identify and debunk the top 5 VDI myths out there and offer tips for calculating proper storage for VDI. 
(EGUIDE) READ ABSTRACT |

Stopping Privilege Creep: Limiting User Privileges with Access Reviews by SearchSecurity.com

July 2013 - (Free Research)
This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management by CA Technologies.

January 2013 - (Free Research)
This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats. 
(WHITE PAPER) READ ABSTRACT |

Privileged user management: It's time to take control by CA Technologies

October 2009 - (Free Research)
IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs. 
(WHITE PAPER) READ ABSTRACT |

Avoiding Insider Threats to Enterprise Security by IBM

October 2012 - (Free Research)
This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities. 
(WHITE PAPER) READ ABSTRACT |

CW+: Analyst's take: Cyber-Ark benefits privileged account management by ComputerWeekly.com

December 2010 - (Free Research)
Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities.  Cyber-Ark enables organizations to increase administrator productivity while reducing risk. 
(WHITE PAPER) READ ABSTRACT |

CW+ Quocirca report: Privileged user management by ComputerWeekly.com

October 2010 - (Free Research)
IT managers everywhere feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant themselves and/or their colleagues in order to do their jobs. 
(WHITE PAPER) READ ABSTRACT |

The Aruba Mobile Virtual Enterprise: The Next-Generation Network Access Architecture for the Post-Laptop Era by Aruba Networks, Inc.

March 2011 - (Free Research)
Aruba MOVE unifies wired, wireless and remote access into one cohesive access solution - for traveling business professionals, remote office workers, corporate headquarters employees and guests.Access privileges are context aware and this dictates the type of network resources each person is entitled to. Read this paper for more. 
(WHITE PAPER) READ ABSTRACT |

Avoiding Insider Threats to Enterprise Security by IBM

March 2013 - (Free Research)
In an increasingly cloud-based IT universe, concerns are being raised and addressed regarding the security of privileged and shared accounts. See this white paper for more information on the latest in cloud-based security for privileged identities. 
(WHITE PAPER) READ ABSTRACT |

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance by LogRhythm, Inc.

March 2012 - (Free Research)
This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts. 
(WHITE PAPER) READ ABSTRACT |

Exchange Server administration policy: Managing privileged user access by F5 Networks

November 2012 - (Free Research)
Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access. 
(EGUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: The critical role of privileged account management in data security by IBM

August 2011 - (Free Research)
Privileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts