Owning MaintainWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Owning Maintain returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Mobile Device Management
 •   Virtualization
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Enterprise Systems Management
 •   Endpoint Security
 •   Data Center Management
 •   Business Process Management (BPM)
 •   Wireless Security

Related Searches
 •   Devices Owning Maintain
 •   Disk Owning Maintain
 •   Format Owning Maintain
 •   Marketing Owning Maintain
 •   Owning Automation
 •   Owning Maintain Migration
 •   Owning Maintain Proposal
 •   Owning Maintain Schedules
 •   Practice Owning Maintain
 •   Reservation Owning
Advertisement

ALL RESULTS
1 - 25 of 447 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both. by Insight

May 13, 2013 - (Free Research)
Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more. 
(WHITE PAPER) READ ABSTRACT |

E-Zine: Enterprise CIO Decisions: Data Centers - Owning vs. Outsourcing by SearchCIO.com

September 09, 2010 - (Free Research)
Many factors are causing CIOs to wonder which is better: colocation, cloud computing or maintaining your own data center. Check out this month’s E-Zine from Enterprise CIO Decisions for expert opinions and advice on these important topics and learn best practices for managing your data center in this unpredictable economy. 
(EZINE)

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

E-Zine: Enterprise CIO Decisions: Data Centers - Owning vs. Outsourcing by HCL Technologies Ltd.

December 13, 2010 - (Free Research)
Many factors are causing CIOs to wonder which is better: colocation, cloud computing or maintaining your own data center. Check out this month’s E-Zine from Enterprise CIO Decisions for expert opinions and advice on these important topics and learn best practices for managing your data center in this unpredictable economy. 
(EZINE)

Three Keys to Effective Service-oriented Architecture Governance by Accenture

June 2008 - (Free Research)
While most leading companies' IT organizations are well on the way to adopting service-oriented architecture capabilities, many find their progress slowed by questions about who owns business services. 
(WHITE PAPER) READ ABSTRACT |

Guide: Desktop Authority Password Self-Service by ScriptLogic Corporation

June 2009 - (Free Research)
Desktop Authority® Password Self-Service™ provides an easy-to-use, robust system for allowing users to reset their own forgotten passwords or locked accounts, eliminating the biggest source of help desk calls. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

July 2010 - (Free Research)
With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Taking Your Enterprise Mobile: The Executive Checklist by Zenprise

July 2012 - (Free Research)
With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information. 
(WHITE PAPER) READ ABSTRACT |

Customer story: Hotels Combined by IBM

December 2013 - (Free Research)
HotelsCombined.com chose Softlayer as their laaS provider beacause of SoftLayer's proven track record and mature business processes. Hotelscombined.com was also pleased with the personal care and the amount of control they maintained as well as the cuttng edge technologies like scalable cloud computing and solid-state drives that SoftLayer employs. 
(CASE STUDY) READ ABSTRACT |

Empowering business mobility through virtualization by Citrix

June 2012 - (Free Research)
Desktop and application virtualization can help you embrace workshifting, consumerization, Bring Your Own Device (BYOD) and other mobile initiatives without sacrificing security. This white paper explores the factors of a successful mobility project and explains how you can craft comprehensive BYOD policies. 
(WHITE PAPER) READ ABSTRACT |

Empowering business mobility through virtualization by Citrix

June 2012 - (Free Research)
Desktop and application virtualization can help you embrace workshifting, consumerization, Bring Your Own Device (BYOD) and other mobile initiatives without sacrificing security. This white paper explores the factors of a successful mobility project and explains how you can craft comprehensive BYOD policies. 
(WHITE PAPER) READ ABSTRACT |

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage by AppAssure Software, Inc.

March 2009 - (Free Research)
Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low. 
(CASE STUDY) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

Maintaining security in managed services by SecureWorks

December 2011 - (Free Research)
Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model. 
(EGUIDE) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

HP and VMware Take the Cost and Complexity Out of IT by VMware, Inc.

February 2009 - (Free Research)
To meet the constant demand to deploy, maintain and grow a broad array of services and applications, IT organization must continually add new servers. Read this to learn about creating a fully functional virtual machine that can run its own operating system and applications just like a real computer. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for a Successful Upgrade Project by HCL Technologies Ltd.

July 2008 - (Free Research)
Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability. 
(ANALYST REPORT) READ ABSTRACT |

Reduce Cost and Complexity of Your Backup with NetBackup Backup Appliance by Symantec Corporation

November 2013 - (Free Research)
There is a backup appliance specifically designed to eliminate the effort and time of installing and maintaining your disaster recovery and backup software and hardware, while saving you money. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

SAS® Business Analytics for IT Leaders by SAS

October 2010 - (Free Research)
IT leaders, tasked to satisfy the needs of their own business units while satisfying the changing needs of all other business units, face a wide variety of challenges. This white paper identifies the key issues that must be addressed and provides a clear strategy for solving them. Read on to learn more about SAS® Business Analytics for IT leaders. 
(WHITE PAPER) READ ABSTRACT |

Swedish Social Insurance Agency DoesBYOD Right by McAfee, Inc.

August 2013 - (Free Research)
This informative case study details how a Swedish government insurance agency was able to deliver a BYOD solution that maintains strict security criteria, is clientless and is simple to manage, enabling the flexibility users demand without sacrificing security. 
(CASE STUDY) READ ABSTRACT |

Sun Microsystems' Solutions for Virtualization across the Enterprise by LEGACY - DO NOT USE - Insight

June 2008 - (Free Research)
Sun’s customer-driven approach for how companies implement a virtual environment will enable customers to choose the right virtualization tool for the job yet still maintain cohesive management of a heterogeneous environment. 
(ANALYST REPORT) READ ABSTRACT |

Quest Software Finds Increased Security, Disaster Preparedness, and Cost Savings through Virtual Desktop Infrastructure by Dell Software

June 2009 - (Free Research)
After evaluating a number of VDI solutions, Quest was most impressed with vWorkspace, one of its own applications that had been integrated into its product portfolio from its 2007 acquisition of Provision Networks. This case study will show how using VDI resulted in significant time and cost savings for Quest. 
(CASE STUDY) READ ABSTRACT |

Application Brief: Multi-tenant Cloud Security by Vyatta Inc.

April 2011 - (Free Research)
Multitenant cloud security is a critical concern for cloud service providers and end users alike. One significant challenge involves maintaining compliance to corporate and regulatory standards, while leveraging the shared infrastructure model’s cost benefits and improved operational efficiency. 
(APPLICATION NOTE) READ ABSTRACT |

Analyst Report: Addressing the Complexities and Growing Requirements of the Future by IBM

October 2012 - (Free Research)
As mobile device adoption gains traction for personal usage, it's also becoming increasingly popular in the workplace. In response, enterprises must develop strategies for managing the inherent complexity of these new devices in order to improve productivity and optimize performance, while also protecting data and maintaining security. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 447 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts