Mac Data SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Mac Data Security returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Virtualization
 •   Network Management
 •   Networks
 •   WAN/ LAN Solutions
 •   Data Security
 •   Desktop Management
 •   Application Management and Maintenance
 •   Endpoint Security
 •   Operating Systems and Subsystems

Related Searches
 •   Capacity Mac Data
 •   Comparing Mac
 •   Mac Data Imports
 •   Mac Data Market
 •   Mac Databases
 •   Mac Trends
 •   Notes Mac Data Security
 •   Questions About Mac Data Security
 •   Using Mac Data Security
 •   Vendor Mac Data Security
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 26, 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Why It’s Time for Enterprises to Secure Mac Computers by Symantec Corporation

December 31, 2013 - (Free Research)
This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems. 
(WHITE PAPER) READ ABSTRACT |

Client Management Best Practices for Managing Mac Systems by CDW

April 15, 2010 - (Free Research)
One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Sophos Security Threat Report Mid-Year 2011 by Sophos, Inc.

August 23, 2011 - (Free Research)
Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe. 
(ANALYST REPORT) READ ABSTRACT |

La Jolla Institute for Allergy & Immunology: Customer Video by Absolute Software

November 12, 2013 - (Free Research)
In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices. 
(VIDEO) READ ABSTRACT |

The Best of Both Worlds: Sharing Mac Files on Windows Servers by GroupLogic

October 27, 2009 - (Free Research)
This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing a Mac/Windows integration solution. 
(WHITE PAPER) READ ABSTRACT |

ESET File Security for Linux/BSD/Solaris by ESET

August 03, 2010 - (Free Research)
Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

Desktop Virtualization: Overcoming five real-world challenges by Citrix

April 21, 2009 - (Free Research)
Success with server virtualization is leading many firms to explore the next frontier - virtualizing employee desktops. The opportunities are significant, but so are the challenges, both technical and psychological. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Monster Tool spends fewer than five minutes a day on backup tasks using NetVault Backup by Dell Software Group (E-mail this company)

September 28, 2012 - (Free Research)
This short case study reveals how one company deployed a modern backup and recovery solution and explores the benefits they've come to know. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Integrating Mac OS X into Active Directory by CDW

April 23, 2010 - (Free Research)
Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment. 
(VIDEOCAST) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 01, 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Top Five Network Access Control Challenges by Juniper Networks, Inc.

January 31, 2012 - (Free Research)
Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues. 
(WHITE PAPER) READ ABSTRACT |

Global Threat Report - September 2011 Backup strategy for your home users by ESET

November 10, 2011 - (Free Research)
This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for. 
(WHITE PAPER) READ ABSTRACT |

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media by PGP Corporation

February 03, 2010 - (Free Research)
PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security. 
(WHITE PAPER) READ ABSTRACT |

Centrify Express 2010.1 by Centrify Corporation

August 06, 2010 - (Free Research)
Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings. 
(DOWNLOAD)

Macs in the Enterprise: Using Windows and Mac apps side-by-side by Parallels, Inc.

August 15, 2012 - (Free Research)
Read this transcript to learn how your company can run Windows and Mac applications side-by-side 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Using Mac and Windows apps side-by-side by Parallels, Inc.

August 14, 2012 - (Free Research)
Listen to this podcast to learn how you can run Mac and Windows applications side-by-side 
(WEBCAST) READ ABSTRACT |

VMware Desktop Virtualization: Managing Virtual Desktops Across the Enterprise by AMD and VMware, Inc (E-mail this company)

December 2007 - (Free Research)
Watch this demo to find out how enterprise organizations use VMware desktop virtualization products and solutions to manage and support the flexible needs of their extended, global workforce while strengthening security and control over corporate resources and sensitive information. 
(DEMO) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Basics of Switching by Global Knowledge

June 2013 - (Free Research)
A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination. 
(WHITE PAPER) READ ABSTRACT |

Integrating Macs with Microsoft DFS - Best Practices by GroupLogic

February 2012 - (Free Research)
This document describes three options for integrating Macs with Microsoft DFS infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Infrastructure, Interrupted: Apple in the Enterprise Redefined by Acronis

October 2012 - (Free Research)
Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization. 
(WHITE PAPER) READ ABSTRACT |

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by ESET

March 2011 - (Free Research)
ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts