Secure DesktopsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Desktops returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Desktop Management
 •   Desktops/ Workstations
 •   Data Security
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   Endpoint Security
 •   Data Center Management
 •   Application Security

Related Searches
 •   Diagram Secure Desktops
 •   Examples Secure Desktops
 •   Experts Secure Desktops
 •   Layer Secure Desktops
 •   Review Secure
 •   Secure Desktops Comparisons
 •   Secure Desktops Market
 •   Secure Desktops Order
 •   Secure Roi
 •   Secure Whitepaper
Advertisement

ALL RESULTS
1 - 25 of 422 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Dell DVS Enterprise - Mobile Secure Desktop by Dell and VMware

June 11, 2013 - (Free Research)
This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

4 reasons to go beyond VMware View with Citrix XenDesktop by Citrix

May 12, 2014 - (Free Research)
This whitepaper examines the potential limitations associated with VMware View and how to move beyond them. 
(WHITE PAPER) READ ABSTRACT |

4 Reasons To Go Beyond VMware View with Citrix XenDesktop by Citrix

March 03, 2014 - (Free Research)
This whitepaper examines four reasons to move past the limitations of VMware View. 
(WHITE PAPER) READ ABSTRACT |

Virtual Computer on 2nd Generation Intel Core vPro Processors by Intel

September 12, 2011 - (Free Research)
Peter Marconi, Senior VP of Engineering at Virtual Computer, talks about how NxTop, Virtual Computer's baremetal client hypervisor, and 2nd generation Intel® Core™ vPro™ processors work together to deliver a secure, desktop virtualization solution. Watch this informative video to learn how to increase your PCs manageability and performance. 
(VIDEO) READ ABSTRACT |

Desktop Virtualization: The Key for Securing Your Enterprise by Citrix

October 04, 2010 - (Free Research)
In this paper, Citrix® unveils how desktop virtualization provide IT organizations visibility and control over data to help achieve security and regulatory requirements, without compromising business performance, productivity, and the user experience. 
(WHITE PAPER)

Managing the Dynamic Desktop with System Center Solutions by Microsoft

September 08, 2009 - (Free Research)
System Center desktop solutions help IT to reconcile competing demands of security with resource availability by streamlining the connection of any authorized user to any application, regardless of their location or connectivity, through a unified system that provides both secure access and the consistent, optimized performance your users expect. 
(DATA SHEET) READ ABSTRACT |

Browser based access to Windows applications and desktops – AccessNow by Ericom by Ericom Software

October 28, 2011 - (Free Research)
Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device. 
(TRIAL SOFTWARE) READ ABSTRACT |

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace by VMware, Inc.

September 12, 2013 - (Free Research)
This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management. 
(WEBCAST) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

December 09, 2013 - (Free Research)
This informative resource details the major components that make desktop virtualization secure by design. 
(WHITE PAPER) READ ABSTRACT |

Bring Distributed Environments Under Control with Desktop Virtualization by Dell and Microsoft

November 18, 2013 - (Free Research)
This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Ways Desktop Virtualization Enhances Security by Citrix

December 31, 2013 - (Free Research)
This resource details the major components that make desktop virtualization secure by design. 
(WHITE PAPER) READ ABSTRACT |

Secure Remote Access your Users will Love by Citrix

January 06, 2014 - (Free Research)
This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose. 
(WHITE PAPER) READ ABSTRACT |

Pharmaceutical Services Company Accelerates Virtual Desktops by Cisco Systems, Inc.

July 11, 2012 - (Free Research)
This case study demonstrates how Quintiles Pharmaceutical Services extended WAN optimization to 100 percent of their virtual desktop infrastructure and improved traffic flow with their existing bandwidth, allowing for secure and centralized data and access control, and high levels of employee satisfaction. 
(CASE STUDY) READ ABSTRACT |

PowerTerm WebConnect - Free 30 Day Trial! by Ericom Software

June 29, 2010 - (Free Research)
PowerTerm WebConnect enhances the flexibility and reliability of Microsoft Terminal Servers, Virtual Desktops and Blade PCs. More flexible, affordable and easier to deploy and extend throughout the organization,  Ericom's centrally administered solution installs and deploys in hours making it an ideal application for mobile workforces. 
(TRIAL SOFTWARE) READ ABSTRACT |

How to Make Virtual Desktop Security Simpler and More Scalable by Citrix

April 25, 2011 - (Free Research)
It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users. 
(WEBCAST) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 07, 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

VMware View WithJuniper NetworksSA Series SSL VPN Appliances: Configuring Secure SSL VPN Access in aVMware Virtual Desktop Environment by Juniper Networks, Inc.

March 15, 2010 - (Free Research)
Customers running a VMware View environment don’t just want secure access for virtual desktop sessions, they want convenience as well. With this in mind, Juniper Networks extend the security deployment by brokering connections to virtual machines and providing single sign-on (SSO) when users access their assigned virtual desktops. 
(WHITE PAPER) READ ABSTRACT |

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming by VMware, Inc.

January 11, 2012 - (Free Research)
Learn how to maximize electronic medical records (EMR) user adoption by providing fast, convenient, secure access to EMR data across multiple clients, where and when the clinician requests it. 
(WHITE PAPER) READ ABSTRACT |

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 22, 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Secure Virtual Desktop Infrastructure by Citrix Systems, Inc. (E-mail this company)

October 17, 2013 - (Free Research)
Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Making BYOD Simple and Secure by Citrix Systems, Inc. (E-mail this company)

March 30, 2012 - (Free Research)
This white paper presents practical guidance and best practices for using desktop virtualization, a self-service app store and secure file sharing and synchronization to deliver on-demand files, apps and desktops to any type of device, allowing organizations to leverage the full power of consumerization. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Secure AND Cost-Efficient Desktop Virtualization by Citrix

December 31, 2013 - (Free Research)
This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing. 
(WHITE PAPER) READ ABSTRACT |

Expert Tips on Getting Mobile Securely with Virtual Desktops by SearchSecurity.com

September 30, 2011 - (Free Research)
In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices. 
(EGUIDE) READ ABSTRACT |

Securing virtual desktop infrastructure with Citrix NetScaler by Citrix

March 11, 2013 - (Free Research)
In this informative resource, discover an appliance tool that integrates an extensive set of network and application-layer protection mechanisms with advanced access and action control capabilities to improve the availability, performance and scalability of your virtual desktop infrastructure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 422 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts