End Point Control ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: End Point Control Application returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Application Management and Maintenance
 •   Access Control
 •   Endpoint Security
 •   Network Management
 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Application Security
 •   WAN/ LAN Solutions

Related Searches
 •   Demo End Point Control
 •   Devices End Point
 •   Documentation End Point Control
 •   End Designs
 •   End Illinois
 •   End Point Control Pay
 •   End Point Control Support
 •   Performance End Point Control
 •   Specialists End Point
 •   Spreadsheet End Point
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Rethinking Backup and Recovery: Business Continuity in the Datacenter and Beyond by Asigra

April 24, 2014 - (Free Research)
This on-demand webinar explains the challenges of the modern data center in terms of developing a business continuity strategy that can handle backing up all of the data from new devices and apps. 
(WEBCAST) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 20, 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

Control Compliance Suite Trialware by Symantec Corporation

April 01, 2009 - (Free Research)
Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial. 
(DOWNLOAD)

Gain Visibility And Insight Into All Your Application Investments by Hewlett-Packard Company

August 31, 2012 - (Free Research)
Trends such as Agile development, mobile applications, outsourcing, and composite applications are changing the definition of application lifecycle management (ALM). You need a complete end-to-end view of your application investments -- you need project and portfolio management (PPM) as a part of your ALM strategy. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

Don’t Forget the “User” in User Data Management by Copiun

May 07, 2010 - (Free Research)
The end users' point of view is really important, because they are all about ease of use and productivity and their sheer number makes it hard to control their behavior. This article will take a look at the requirements end users expect from the data management or data backup solutions. 
(JOURNAL ARTICLE) READ ABSTRACT |

Choosing the Right Metropolitan Ring for Your Business by AT&T Corp

March 01, 2011 - (Free Research)
Businesses are evolving and looking for more effective and efficient methods of handling bandwidth, performance and end-point needs. In addition, they are trying to anticipate future needs to help make good networking decisions. 
(WHITE PAPER)

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 13, 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Understanding the Benefits of Application Virtualization by Dell and Microsoft

June 2012 - (Free Research)
Explore how application virtualization can help your business prepare for the consumerization of IT. Access this expert resource to gain insights on its many use cases, how it differs from desktop virtualization, and the substantial benefits it can offer both your IT department and end-users. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Blue Coat Accelerates Automated CLI Testing, Reaps New Efficiencies with FanfareSVT by Fanfare

December 2006 - (Free Research)
Blue Coat needed to improve its test automation practices with tools & solutions that automate test cases during the development phase, increase test coverage, & identify changes that are not easily identified from build to build. Read why Blue Coat selected FanfareSVT test automation software to work seamlessly within its existing infrastructure. 
(CASE STUDY) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

802.11n: The End of Ethernet? by Aruba Networks

September 2009 - (Free Research)
This report compares 802.11n to Gigabit Ethernet for use in local area network (LAN) access applications. More specifically, the report compares both technologies in six dimensions: mobility, performance, security, management, staffing, and cost. 
(ANALYST REPORT) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Maximizing the Strategic Point of Control in the Application Delivery Network by F5 Networks

February 2012 - (Free Research)
Improve performance, implement security procedures, and institute server redundancy that is invisible to the user by leveraging the strategic point of control that exists between the servers in the data center and the Internet. 
(WHITE PAPER) READ ABSTRACT |

When Good Applications Go Bad: Adding Application Control to your Toolbox by Fortinet, Inc. / Alternative Technology Group of Arrow ECS

October 2009 - (Free Research)
Check out this podcast transcript for the latest information about application security threats and how Fortinet can provide multi-function security system solutions as well as an award-wining Partner Program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Ixia’s Visibility Architecture by Ixia

February 2014 - (Free Research)
Learn more about the importance of your access to and control of data at every point in the physical and virtual network, and how to enable end-to-end visibility and security. 
(VIDEO) READ ABSTRACT |

ESG: A Phased Approach to Network Access Control (NAC) by Symantec Corporation

July 2008 - (Free Research)
Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.</ 
(WHITE PAPER) READ ABSTRACT |

Understanding Desktop Virtualization by Intel

June 2011 - (Free Research)
Desktop virtualization is being considered by more IT pros as they face increasing pressure to control costs, security, regulate compliance and more. Read this white paper to learn about the various desktop virtualization models available for your infrastructure, how each model works and identify the best fit for your IT shop today. 
(WHITE PAPER) READ ABSTRACT |

AppSense User Virtualisation Platform by AppSense

June 2011 - (Free Research)
Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices. 
(PRODUCT REVIEW) READ ABSTRACT |

Foglight - Application Management to Unify IT and the Business by Dell Software

Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire application infrastructure to the true root-cause of a problem. 
(ASP & SOFTWARE PRODUCT)

Cisco CleanAir Technology by Cisco Systems, Inc.

March 2012 - (Free Research)
Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience. 
(WEBCAST) READ ABSTRACT |

Monitoring Application Performance from an End-User Perspective by Fluke Networks

April 2010 - (Free Research)
Download this whitepaper to learn how to see and solve user experience problems from their point of view. We’ll show you how to measure actual application traffic from the user perspective and other critical points in the network. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts