Medium DevicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Medium Devices returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Mobile Device Management
 •   Virtualization
 •   Wireless Security
 •   Enterprise Information Integration/ Metadata Management
 •   Application Management and Maintenance
 •   Wi-Fi
 •   Security Policies
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Define Medium Devices
 •   Demonstration Medium
 •   Layer Medium Devices
 •   Marketing Medium Devices
 •   Medium Backups
 •   Medium Devices Related
 •   Medium Devices Types
 •   Medium Schedule
 •   Procurement Medium
 •   Supply Medium Devices
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 10, 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 01, 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

Cisco 850 Series Integrated Services Routers by Cisco Systems, Inc.

The Cisco® 850 Series of secure broadband and wireless routers is part of the Cisco Integrated Services Router portfolio. 
(HARDWARE PRODUCT)

Media Mobility Delivering Ultimate Video Experiences by Motorola, Inc.

December 31, 2008 - (Free Research)
Media Mobility promises a sophisticated user experience that will enable operators to dramatically increase their multi-play service bundles that integrate voice, data and video offerings. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Security: Device Control and Application Control by Lumension

September 13, 2010 - (Free Research)
The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection. 
(TRIAL SOFTWARE)

Lumension® Device Control for Microsoft® System Center by Lumension

January 21, 2010 - (Free Research)
Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement. 
(DATA SHEET)

Lumension Sanctuary Device Control by Lumension

February 13, 2009 - (Free Research)
Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints. 
(TRIAL SOFTWARE)

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Understanding the hard ROI of BYOD by ComputerWeekly.com

June 03, 2013 - (Free Research)
BYOD can increase IT costs, rather than decrease them. Companies need to look at carefuly at a range of variables to calculate the real ROI, says Nucleus Research 
(ANALYST REPORT) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 09, 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Tablet & eReaders: strategies and opportunities by ComputerWeekly.com

September 05, 2011 - (Free Research)
In this report extract, Juniper Research discusses trends in the market for tablet PCs and eReaders. 
(ANALYST BRIEF) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge by Dell, Inc. and Intel®

January 25, 2012 - (Free Research)
This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Meeting the Demand for Multi-Screen Experience by Alcatel-Lucent

October 14, 2009 - (Free Research)
Consumers today tend to use a wide variety of communications devices and are expecting to get video content delivery to any screen. This presentation transcript discusses a new multi-screen solution and how it can support these market needs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Consumerisation of IT by ComputerWeekly.com

April 29, 2013 - (Free Research)
This report looks at the nature and level of activity, motivations and drivers, unintended consequences, and the practicalities of managing consumer devices and social media at work. 
(ANALYST REPORT) READ ABSTRACT |

Tablets in the enterprise: five steps for successful adoption by ComputerWeekly.com

June 27, 2012 - (Free Research)
Tablet devices will give enterprises a competitive advantage according to this in-depth report from Booz&Co. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by IronKey

May 26, 2009 - (Free Research)
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

BYOD – who carries the can? by ComputerWeekly.com

June 17, 2013 - (Free Research)
Rob Bamforth and Clive Longbottom offer advice on balancing the risks and rewards of bring your own device (BYOD). 
(ANALYST REPORT) READ ABSTRACT |

CW Buyers Guide: Mobile Device Management by ComputerWeekly.com

June 07, 2013 - (Free Research)
Computer Weekly looks at mobile enterprise management tools in this 9 page Buyer's Guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW buyer's guide: mobile device management by ComputerWeekly.com

February 18, 2013 - (Free Research)
The Computer Weekly buyer's guide examines how to formulate a strategic policy for mobile device management (MDM). 
(ESSENTIAL GUIDE) READ ABSTRACT |

How Micro-Electro-Mechanical systems are taking over mobile devices by ComputerWeekly.com

February 06, 2012 - (Free Research)
In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks. 
(ANALYST BRIEF) READ ABSTRACT |

The tablet market: consumer trends and market segmentation by ComputerWeekly.com

February 09, 2012 - (Free Research)
The Boston Consulting Group shows how consumer tablets are creating new opportunities as the market grows and segments. 
(ANALYST BRIEF) READ ABSTRACT |

Presentation Transcript: Picking the Right Thin Client by Pano Logic, Inc

December 16, 2009 - (Free Research)
This presentation transcript, featuring Brian Madden and Gabe Knuth, provides expert advice to help you select the right thin client for your environment. Learn which features are important and how to manage thin clients effectively. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts