Own Client-Server Control OverWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Own Client-Server Control Over returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Endpoint Security
 •   Access Control
 •   Application Security
 •   Wireless Security
 •   Security Policies
 •   Virtualization

Related Searches
 •   Importing Own Client-Server
 •   Internet-Based Own Client-Server
 •   Learning Own
 •   Open Own
 •   Own Client-Server Control Advertising
 •   Own Client-Server Control Coding
 •   Own Payment
 •   Own Strategies
 •   Spreadsheet Own Client-Server
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise by Oracle Corporation

January 2011 - (Free Research)
IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access. 
(WHITE PAPER) READ ABSTRACT |

Common Models in SOA: Tackling the Data Integration Problem by Progress

December 2008 - (Free Research)
You're probably familiar with the use of common formats in integration. These common representations, or in some cases mutually agreed upon formats, are often found in B2B transactions. To see how a common model can simplify SOA development, let's examine the standards at the foundation of SOA and ESB to understand what they include and... 
(WHITE PAPER) READ ABSTRACT |

IRMC Used VMware Virtual Desktop Infrastructure to Virtualize its Call Center Operations by AMD and VMware, Inc (E-mail this company)

March 2008 - (Free Research)
IRMC used VMware Virtual Desktop Infrastructure to virtualize its call center operations and support multiple call centers from a central data center, reducing IT costs while improving flexibility and competitiveness. 
(CASE STUDY) READ ABSTRACT |

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by SearchSecurity.com

May 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK) READ ABSTRACT |

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD by SearchSecurity.com

November 2012 - (Free Research)
BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise. 
(EBOOK) READ ABSTRACT |

Rethinking MDM in a BYOD World by SearchSecurity.com

November 2012 - (Free Research)
Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Reliable Inbound Supply Integration by Sterling Commerce, An IBM Company

September 2009 - (Free Research)
This white paper will enumerate the critical business challenges, as well as specific opportunities and benefits of working aggressively to achieve inbound supply integration. 
(WHITE PAPER) READ ABSTRACT |

B.Y.O.D Without the Risk by Juniper Networks, Inc.

June 2012 - (Free Research)
As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - May 2012 by SearchSecurity.com

May 2012 - (Free Research)
Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more. 
(EZINE) READ ABSTRACT |

Check Point Abra: A Virtual Secure Workspace by Check Point Software Technologies Ltd.

June 2010 - (Free Research)
Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints. 
(WHITE PAPER) READ ABSTRACT |

Using Informatica to Improve Data Management, Increase User Productivity, and Reduce Costs: A Case Study of AT&T by Informatica

May 2010 - (Free Research)
Read this paper to learn how AT&T utilized Informatica Data Archive to bring its database growth under control and improve application performance by reducing the amount of total storage required as well as trimming the amount of time required to load and back up its application data sets. 
(CASE STUDY) READ ABSTRACT |

Private cloud computing security issues by DLT Solutions

March 2012 - (Free Research)
While many organizations often favor private clouds over public clouds for it's better control, it shouldn't be a reason to ignore security. All cloud models, private including, has its own share of security risks that must not be overlooked. In this e-guide, gain expert insight into notable private cloud security issues and how to overcome them. 
(EGUIDE) READ ABSTRACT |

Open, Manage, and Accelerate SSL Encrypted Applications by BlueCoat

September 2007 - (Free Research)
Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter. 
(WHITE PAPER) READ ABSTRACT |

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely by Cisco (E-mail this company)

June 2011 - (Free Research)
Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management. 
(WHITE PAPER) READ ABSTRACT |

How to create inherently secure communications by ComputerWeekly.com

November 2010 - (Free Research)
In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. 
(WHITE PAPER) READ ABSTRACT |

Secure Mobile Printing for Business by Hewlett-Packard Limited

October 2013 - (Free Research)
This informative white paper discusses how your organisation can enable reliable printing from any mobile platform or operating system while still providing IT administrators the control over network access and output to protect confidential information. 
(WHITE PAPER) READ ABSTRACT |

Controlling Microsoft Excel Chaos With Business Intelligence by Information Builders Inc. (E-mail this company)

August 2006 - (Free Research)
Enterprises can take control of the burgeoning number of unsanctioned spreadsheets by adopting a policy of centralized master spreadsheet generation. Learn how WebFOCUS creates fully summarized, organized, and styled Excel spreadsheets with complex formulas already in place, lowering the potential for keystroke and logic error. 
(WHITE PAPER) READ ABSTRACT |

Channel Strategies E-Zine - September 2010/ No.3 by SearchITChannel.com

September 2010 - (Free Research)
Learn what's needed to strike the right balance of project work versus managed services sales. Also in this issue, find out how the absence of single-instance storage in Exchange 2010 can affect customers' migration plans, and examine why VDI is becoming one of the more popular technologies to replace traditional client-server computing. 
(EZINE)

Presentation Transcript: Personal vs Shared VDI Images by Pano Logic, Inc

December 2010 - (Free Research)
For about as long as VDI had been around, the discussion over the merits of shared and personal images has persisted. In this transcript of the "Personal vs Shared VDI Images" webcast, Brian Madden and Gabe Knuth will take a look at the merits and drawbacks of each approach in an effort to give the viewer a clear path for implementation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts