Sarbanes-Oxley Products DesktopWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Sarbanes-Oxley Products Desktop returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Desktop Management
 •   Enterprise Data Protection and Privacy
 •   Virtualization
 •   Desktops/ Workstations
 •   Treasury / Cash / Risk Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Records Management
 •   Security Monitoring

Related Searches
 •   Latest Sarbanes-Oxley Products Desktop
 •   Managers Sarbanes-Oxley Products Desktop
 •   Proposals Sarbanes-Oxley Products
 •   Sarbanes-Oxley Products Desktop Missouri
 •   Sarbanes-Oxley Products Outsourcing
 •   Service Sarbanes-Oxley
 •   Top Sarbanes-Oxley Products
 •   View Sarbanes-Oxley
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Simplifying the Collection of Laptop and Desktop Data for eDiscovery by Iron Mountain

September 01, 2010 - (Free Research)
Enterprises today are confronting a dramatic increase in litigation, regulations, and compliance scrutiny. Read this data sheet to discover solutions to these growing issues. 
(DATA SHEET) READ ABSTRACT |

Optimized Licence Management for the Datacenter by Flexera Software

November 09, 2011 - (Free Research)
Read this white paper and learn some of the datacentre licence management challenges, including heterogeneous and multi-platform environments, complex licence models, virtualization and more. 
(WHITE PAPER) READ ABSTRACT |

Zantaz Digital Safe™ Product Family by ZANTAZ

January 2008 - (Free Research)
The ZANTAZ Digital Safe product family has become the solution of choice for leading securities firms, insurance companies and large governmental agencies. 
(WHITE PAPER) READ ABSTRACT |

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

A Decision Maker’s Guide to GRC Solutions by McAfee, Inc.

November 2011 - (Free Research)
It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor. 
(EZINE)

Desktop Delivery: Making Desktop Virtualization Work by Citrix

August 2008 - (Free Research)
This whitepaper discusses Desktop Virtualization and the impact on desktop management. It explores the challenges for desktop management in a pre-Desktop Virtualization world and issues that are not well addressed by Desktop Virtualization. 
(WHITE PAPER) READ ABSTRACT |

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure by Trend Micro, Inc.

July 2010 - (Free Research)
Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Reference Architecture Brief: Dell Virtual Remote Desktop Featuring VMware View 4 by Dell, Inc.

November 2009 - (Free Research)
To help simplify enterprise desktop management, Dell and VMware have created a flexible, highly scalable desktop virtualization reference architecture based on Dell™ PowerEdge™ servers, Dell EqualLogic™ PS Series iSCSI SAN arrays, and powerful new VMware® View 4 technology. 
(ARTICLE) READ ABSTRACT |

VMware ThinApp: Run Any Version of Any App on a Single OS Without Any Conflict by VMware, Inc.

December 2008 - (Free Research)
Find out how VMware ThinApp, the leading desktop virtualization solution, enables agentless application virtualization for accelerated software development and desktop deployment. With ThinApp, you can run any version of any application. 
(WHITE PAPER) READ ABSTRACT |

The Path to Securing Enterprise Desktops: From Personal Computers to Personalized Computing by VMware, Inc.

October 2008 - (Free Research)
This IDC white paper considers desktop virtualization, specifically as made available by VMware's VDI and ACE; it also considers the benefits and limitations of these technologies and best use cases, exemplified through user case studies. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Virtualized Desktops and Converged Infrastructure by VCE (E-mail this company)

August 2011 - (Free Research)
Interest in centralized virtual desktop (CVD) has been steadily mounting in recent years, but underlying infrastructure complexity and high costs have prevented CVD from becoming more widespread. However, specialized solutions aimed at solving these core issues have begun to emerge. This paper discusses the benefits of CVD converged infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Reference Architecture Brief: Dell Virtual Remote Desktop Featuring VMware View 4 by Dell and VMware

November 2009 - (Free Research)
To help simplify enterprise desktop management, Dell and VMware have created a flexible, highly scalable desktop virtualization reference architecture based on Dell PowerEdge servers, Dell EqualLogic PS Series iSCSI SAN arrays, and powerful new VMware View 4 technology. 
(ARTICLE) READ ABSTRACT |

Real-Time Transaction Inspection by Oversight Systems

Oversight Systems automates the analysis and testing of auditors and fraud examiners to reduce ongoing Sarbanes-Oxley compliance costs and provide quality assurance for financial operations. 
(SOFTWARE PRODUCT)

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility. 
(WHITE PAPER) READ ABSTRACT |

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Simplifying the Collection of Laptop and Desktop Data for eDiscovery by Iron Mountain

June 2010 - (Free Research)
Enterprises today are confronting a dramatic increase in litigation, regulations, and compliance scrutiny. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Windows 7 and Desktop Lockdown with Privilege Management by Viewfinity

November 2010 - (Free Research)
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Layering Enterprise Security with Next Generation Access Management by Oracle Corporation

January 2009 - (Free Research)
Read this paper to learn more about the current state of security and identity management. The presenters discuss solutions related to enterprise security issues and the benefits of Oracle products. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence. 
(WHITE PAPER) READ ABSTRACT |

The Renewed Finance Function: Extending Performance Management Beyond Finance by SAP America, Inc.

September 2008 - (Free Research)
In August 2007, CFO Research Services launched a research program to explore the ways in which the role of the finance team has changed in recent years. This report presents the findings of our online survey of 255 senior finance executives. 
(WHITE PAPER) READ ABSTRACT |

Using Desktop Virtualization to Drive Quality and Cost Savings in Clinical Computing by Dell, Inc.

August 2011 - (Free Research)
As the healthcare industry seeks to implement and drive widespread adoption of clinical computing, performance and accessibility of applications for clinicians are critical. Learn how solutions such as client virtualization are increasingly playing a role in bridging the gap between available resources and end-user satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Laptop Locks: A Simple and Cost-Effective Approach to Data Loss Prevention by Kensington

October 2010 - (Free Research)
This paper will educate IT decision makers on the need for physical security, how it can protect sensitive data, and how Kensington laptop locks can help. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts