Intelligent AND building AND security AND managementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Intelligent AND building AND security AND management returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Endpoint Security
 •   Wireless Technologies and Mobile Computing
 •   Virtualization
 •   Mobile Device Management
 •   Security Policies
 •   Network Security
 •   Enterprise Systems Management
 •   Desktop Management
 •   Wireless Security

Related Searches
 •   Diagram Intelligent AND building
 •   Firm Intelligent
 •   Intelligent AND Management
 •   Intelligent AND Specialists
 •   Intelligent AND building Presentation
 •   Intelligent Calls
 •   Intelligent Companies
 •   Managing Intelligent
 •   Market Intelligent AND
 •   Schemas Intelligent AND
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Mobile EndPoint Security and Management - Best Practices by Dell, Inc.

March 08, 2013 - (Free Research)
Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take. 
(EGUIDE) READ ABSTRACT |

May Issue of Information Security Magazine: Data Protection: Going the Distance by Information Security Magazine

May 05, 2011 - (Free Research)
This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time. 
(EZINE)

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g by Oracle Corporation

June 29, 2012 - (Free Research)
While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Five Things You Must Do Before Letting Your Employees Work From Anywhere by Dell, Inc. and Intel®

July 13, 2012 - (Free Research)
This presentation transcript explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

5 Things You Must Do Before Letting Your Employees Work From Anywhere by Dell, Inc. and Intel®

June 28, 2012 - (Free Research)
This webcast explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy. 
(WEBCAST) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Simplifying Deployment, Security and Management of DNS/DHCP Services by BT Diamond IP

February 19, 2008 - (Free Research)
This white paper will offer approaches to streamlining efforts to keep IP networks up and running for critical DHCP and DNS services. 
(WHITE PAPER) READ ABSTRACT |

McAfee ePO Deep Command and Intel vPro Technology by Intel

January 02, 2013 - (Free Research)
In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now. 
(WEBCAST) READ ABSTRACT |

IT Security Management McAfee ePolicy Orchestrator Deep Command by Intel

December 31, 2011 - (Free Research)
This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now. 
(WHITE PAPER) READ ABSTRACT |

The Next Generation Intelligent Network Infrastructure: How the Enterasys S-Series provides critical capabilities for a future-proofed Local Area Network by Enterasys

March 29, 2010 - (Free Research)
This paper discusses three components of the Enterasys S-Series family of next generation intelligent switch routers: Intelligent traffic classification and bandwidth management; Network survivability during times of oversubscription; and Identity and context-based connectivity provisioning. 
(ARTICLE) READ ABSTRACT |

SOA Security: Oracle Web Services Manager by Oracle Corporation

May 14, 2009 - (Free Research)
Companies worldwide are actively implementing service-oriented architectures (SOA), both in intranet and extranet environments. While SOA offers many advantages over current alternatives, deploying networks of web services still presents key challenges...this paper showcases how Oracle's Web Services Manager (WSM) addresses these challenges. 
(DATA SHEET) READ ABSTRACT |

CW+: Quocirca report: The perfect storm: time to review client computing strategies by ComputerWeekly.com

September 10, 2010 - (Free Research)
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. 
(WHITE PAPER) READ ABSTRACT |

InfoSphere BigInsights for Hadoop Quick Start Edition by IBM

October 31, 2013 - (Free Research)
This resource introduces a platform that takes the pain out of Hadoop, empowering your organization to tap into large pools of data and achieve faster, smarter decision-making. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Mobile endpoint security and management - Best practices by Kaseya

May 11, 2011 - (Free Research)
In this e-guide, uncover the challenges associated with selecting a data protection plan for your channel business as well as best practices you should consider in helping you through the process. 
(EGUIDE) READ ABSTRACT |

Dell Intelligent Data Management: Applying the Efficient IT Approach to Enterprise Storage by Dell, Inc. and Intel®

December 31, 2011 - (Free Research)
The Dell Intelligent Data Management strategy is being delivered through Dell Fluid Data solutions to help you automate, optimize, scale, and protect your storage. Fluid Data solutions are designed to optimize your storage by putting the right data in the right place at the right time for the right cost. Read now to learn more. 
(WHITE PAPER)

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

Blue Coat Accelerates Automated CLI Testing, Reaps New Efficiencies with FanfareSVT by Fanfare

December 2006 - (Free Research)
Blue Coat needed to improve its test automation practices with tools & solutions that automate test cases during the development phase, increase test coverage, & identify changes that are not easily identified from build to build. Read why Blue Coat selected FanfareSVT test automation software to work seamlessly within its existing infrastructure. 
(CASE STUDY) READ ABSTRACT |

Inside IBM Intelligent Investigation Manager by IBM

November 2012 - (Free Research)
Sit back for five minutes to watch this video and catch an inside look at a technology designed to protect your organization from fraud, which is more malicious and easier than ever across today's expansive IT and business operations. 
(VIDEO) READ ABSTRACT |

Video: SaaS Endpoint Visibility and Security with Tivoli Endpoint Manager by IBM

August 2011 - (Free Research)
Check out this series of quick, user-focused videos to learn what customers are saying about Tivoli Endpoint Manager. Discover if this security and management solution is right for your organization's needs by clicking through to learn more. 
(VIDEO) READ ABSTRACT |

Cisco Cloud Intelligent Network: Connect the World of Many Clouds by Cisco Systems, Inc.

December 2012 - (Free Research)
Access this white paper as it discusses how intelligent networks are the foundation that connects the world of many clouds by creating a new dynamic interconnection that harnesses the capabilities and facilitates an integrated approach to service delivery. 
(WHITE PAPER) READ ABSTRACT |

Xiotech Emprise 5000 and Citrix XenServer 5.5.0 by Xiotech Corporation

June 2010 - (Free Research)
Xiotech's Emprise 5000 system is a revolutionary concept in data storage. It is built on patented Intelligent Storage Element (ISE) technology and provides a perfectly balanced building block of performance, reliability, and scalability that delivers the lowest total cost of ownership of any SAN or SAN-like storage system on the market. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

Considering a BYOPC Strategy by Symantec Corporation

November 2012 - (Free Research)
Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation. 
(EGUIDE) READ ABSTRACT |

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud by Webroot

February 2013 - (Free Research)
This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more! 
(EGUIDE) READ ABSTRACT |

EXA Corporation Creates a Secure and Resilient Private Cloud by IBM

June 2012 - (Free Research)
In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts