Group Reservation UsbWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Group Reservation Usb returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Mobile Device Management
 •   Application Security

Related Searches
 •   Group Computer
 •   Group Reservation Strategic
 •   Group Reservation Unix
 •   Group Reservation Usb Crm
 •   License Group Reservation Usb
 •   Lists Group Reservation Usb
 •   Recovery Group Reservation Usb
 •   Resources Group Reservation Usb
 •   Statements Group
 •   Types Group
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 12, 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

Barclays Bank by Lumension

August 2008 - (Free Research)
Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices. 
(CASE STUDY) READ ABSTRACT |

Hilton Reservations Worldwide by Aspect

March 2008 - (Free Research)
Since implementing the workforce management capabilities, HRW has seen data accuracy go from within ten percent of actual to within three percent of actual due to Aspect eWorkforce Management. 
(CASE STUDY) READ ABSTRACT |

Lumension® Device Control for Microsoft® System Center by Lumension

January 2010 - (Free Research)
Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement. 
(DATA SHEET)

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture by GlobalScape

December 2012 - (Free Research)
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. 
(WHITE PAPER) READ ABSTRACT |

The TERA1100 Portal Processor by Teradici Corporation

The TERA1100 Portal Processor enables centralized computing to span an enterprise network from the datacenter to the desktop by implementing advanced display compression algorithms and I/O bridging to guarantee a high performance user experience. 
(HARDWARE PRODUCT)

The business benefits of switching to mobile TV by ComputerWeekly.com

November 2010 - (Free Research)
Over the past two years, the mobile TV landscape has changed dramatically. 
(WHITE PAPER) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent USB Insecurity by Lumension

October 2013 - (Free Research)
This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension

January 2011 - (Free Research)
USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk. 
(WHITE PAPER) READ ABSTRACT |

Europe's Largest Regional Airline Protects Reservations System and Company Data with Veeam by Veeam Software

December 2013 - (Free Research)
Check out this resource to find out how a leading vendor's backup solution helped Europe's largest regional airline eliminate downtime. 
(WHITE PAPER) READ ABSTRACT |

How to Achieve Device Control Peace of Mind by Lumension

July 2013 - (Free Research)
Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices. 
(CASE STUDY) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

The TERA1200 Host Processor by Teradici Corporation

The TERA1200 Host Processor delivers a true, uncompromised PC experience over IP networks. It provides transparent USB and HD audio bridging, USB device authorization, and encrypted communications. 
(HARDWARE PRODUCT)

Dell ProSupport Hard Drive Data Recovery Service by Dell, Inc.

January 2009 - (Free Research)
Dell's Hard Drive Data Recovery Service gives customers of all sizes - from small businesses to large public companies and government agencies - the opportunity to recover data from a failed hard drive. 
(DATA SHEET) READ ABSTRACT |

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks by IronKey

March 2009 - (Free Research)
Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level. 
(WHITE PAPER) READ ABSTRACT |

The Top Five Myths of IP Communications by Cisco Systems, Inc.

February 2008 - (Free Research)
This white paper addresses the top concerns of IT professionals who resist the deployment of pervasive, enterprise-wide wireless networks. It identifies these reservations based on the experience of Cisco Systems and Intel. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

Lumension Sanctuary Device Control by Lumension

February 2009 - (Free Research)
Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints. 
(TRIAL SOFTWARE)

Virtualize Enterprise Applications with Less Peril, More Payoff by SearchServerVirtualization

January 2014 - (Free Research)
Before you virtualize the applications that keep your business running, learn how to avoid performance and availability issues. 
(EGUIDE) READ ABSTRACT |

Virtualizing Business-Critical Applications on vSphere by VMware, Inc.

October 2012 - (Free Research)
This in-depth whitepaper explains the benefits of virtualization for business-critical applications in your VMware environment as well as addresses the potential hurdles in the process. Uncover details about virtualizing Exchange, Oracle, SQL, SAP and more. 
(WHITE PAPER) READ ABSTRACT |

The Truth About Mobile Business Intelligence by Information Builders

August 2012 - (Free Research)
Mobile business intelligence (BI) is not a new concept, but the rumors that it's too complex, cumbersome, expensive, and limited have prevented most organizations from making the investment. Access this exclusive paper to uncover the 5 most common mobile BI myths debunked and how mobile BI can help you gain a competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

5 Myths about Leading Virtual Teams by Citrix Online Go To Meeting

February 2014 - (Free Research)
Consult the following white paper to learn about the 5 most common myths that negatively affect the performance and usefulness of a virtual team. Also uncover what managers and leaders can do to overcome these issues, ultimately giving rise to the collaborative ability needed in today's market. 
(WHITE PAPER) READ ABSTRACT |

Trusted Computing: What the Future Looks Like by Wave Systems Corp.

September 2010 - (Free Research)
Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries. 
(VIDEOCAST) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts