Intranet Desktop ControlsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Intranet Desktop Controls returned the following results.
RSS What is RSS?
Related Categories

 •   VPN, Extranet and Intranet Solutions
 •   Network Security
 •   Virtualization
 •   Network Management
 •   Desktop Management
 •   Data Security
 •   Remote Access Technologies
 •   Networks
 •   Access Control
 •   Unified Communications / Voice & Data Convergence

Related Searches
 •   Directory Intranet
 •   Global Intranet Desktop Controls
 •   Intranet Customer
 •   Intranet Desktop Controls Fact
 •   Intranet Desktop Controls Open
 •   Intranet Desktop Integration
 •   Intranet Desktop Kansas
 •   Intranet Print
 •   Schemas Intranet Desktop
 •   Support Intranet Desktop
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by Bit9, Inc.

June 09, 2009 - (Free Research)
Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment. 
(WHITE PAPER) READ ABSTRACT |

Expert approach to combining VDI and unified communications by SearchSecurity.com

January 13, 2012 - (Free Research)
This expert e-guide form SearchUnifiedCommunications.com explains how to best approach unified communications in a virtual desktop infrastructure. 
(EGUIDE) READ ABSTRACT |

To Block or Not. Is that the Question? by Palo Alto Networks

December 01, 2009 - (Free Research)
This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement. 
(WHITE PAPER) READ ABSTRACT |

Investing in IP Phones: How to Control Costs, Now and Later by Cisco Systems, Inc.

January 20, 2011 - (Free Research)
Businesses that use voice over IP (VoIP) service and IP phones gain many advantages. No wonder desktop IP phones are used by more than a third of small and medium-sized businesses surveyed in Europe and North America. Continue reading to learn more and discover how to make the best investment through seven key questions. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Legacy Remote Control Tools: Not Built for Today’s Helpdesk by LogMeIn, Inc.

January 11, 2011 - (Free Research)
This paper explores the challenges and hidden costs of supporting a remote workforce with legacy tools. In addition, it identifies best practices that decision makers can use to choose enterprise helpdesk support tools that better meet the needs of remote employees, while helping to reduce costs. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

VMware View WithJuniper NetworksSA Series SSL VPN Appliances: Configuring Secure SSL VPN Access in aVMware Virtual Desktop Environment by Juniper Networks, Inc.

March 2010 - (Free Research)
Customers running a VMware View environment don’t just want secure access for virtual desktop sessions, they want convenience as well. With this in mind, Juniper Networks extend the security deployment by brokering connections to virtual machines and providing single sign-on (SSO) when users access their assigned virtual desktops. 
(WHITE PAPER) READ ABSTRACT |

Selection Criteria for Remote Support Tools: “Best-of-Breed” Products Speed ROI for Technology Investment by NTR Global

October 2009 - (Free Research)
Remote support technology is a very popular service and support automation tool for high-tech companies. Freeware and shareware options are available, but come with their own risks. Leveraging a best-of-breed product can improve operational efficiency and customer satisfaction. Read on to learn what to look for in a remote support platform. 
(WHITE PAPER) READ ABSTRACT |

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc (E-mail this company)

July 2007 - (Free Research)
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware’s VDI and ACE. The document also considers the benefits and limitations of these technologies as well as the best use cases for each, exemplified through user case studies. 
(ANALYST REPORT) READ ABSTRACT |

MapXtreme Java v4.8.1 by MapInfo Corporation

March 2008 - (Free Research)
This IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet. 
(DEMO) READ ABSTRACT |

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks by Extreme Networks (E-mail this company)

February 2014 - (Free Research)
This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance. 
(WHITE PAPER) READ ABSTRACT |

MapXTreme Java Edition Data Sheet by Pitney Bowes Business Insight

January 2007 - (Free Research)
MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet. 
(DATA SHEET) READ ABSTRACT |

Tableau Customer Case Study by Tableau Software

August 2008 - (Free Research)
While researching for flexible and interactive reporting tools, Ferrari and Maserati of North America's were discouraged by the complexity and cost of the BI solutions available, so to overcome with it they deployed Tableau Desktop solution. 
(CASE STUDY) READ ABSTRACT |

The US Department of Defense Maintains Application Security and Eliminates Software Conflicts When Deploying Applications to Locked-down Desktops by Thinstall

January 2008 - (Free Research)
The DOD chose Thinstall to address the demanding deployment requirements, using it initially for 12 applications. 
(CASE STUDY) READ ABSTRACT |

How to tackle internet filtering and reporting by ComputerWeekly.com

November 2010 - (Free Research)
In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled. 
(WHITE PAPER) READ ABSTRACT |

Key tips to socialize your intranet by Jive Software

July 2013 - (Free Research)
Today, businesses need an intranet that's one that's social, engaging, and productive. By combining key social features along with capabilities for driving greater alignment, businesses can experience innovations and productivity not seen within the enterprise since the introduction of email. 
(WHITE PAPER) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

Planning Guide: BlackBerry Enterprise Server by BlackBerry

October 2010 - (Free Research)
The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. 
(WHITE PAPER) READ ABSTRACT |

PC Desktop Virtualization by VMware and IBM (E-mail this company)

January 2006 - (Free Research)
If a virtual server is a good idea, why not extend that notion to a virtual desktop PC? Learn how users can retain full control of their desktop environment while continuing to enjoy all of the functionality associated with personal control. 
(WHITE PAPER) READ ABSTRACT |

Bring Distributed Environments Under Control with Desktop Virtualization by Dell and Microsoft

November 2013 - (Free Research)
This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Benchmarking the Social Intranet by Jive Software

July 2013 - (Free Research)
Social business is a relatively new phenomenon. How should your business go about quantifying the success of adoption figures? This resource offers some key insights into the adoption rates of companies ranging from education to finance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts