Security DesktopsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Desktops returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Desktop Management
 •   Desktops/ Workstations
 •   Data Security
 •   Endpoint Security
 •   Network Security
 •   Application Security
 •   Wireless Technologies and Mobile Computing
 •   Remote Access Technologies
 •   Mobile Device Management

Related Searches
 •   Article About Security Desktops
 •   Calls Security Desktops
 •   Disk Security Desktops
 •   Net Based Security Desktops
 •   Security Companies
 •   Security Desktops Documents
 •   Security Desktops Net
 •   Security Desktops Networks
 •   Security Desktops Planning
 •   Security Webinars
Advertisement

ALL RESULTS
1 - 25 of 455 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Drivers for Desktop Virtualization and Current Challenges by Dell Inc., Intel, Citrix

April 07, 2011 - (Free Research)
In this transcription of a webcast, Dell explores this “Next Generation of End User Computing.” Gain insight into how the evolving workforce is facilitating changes within IT. Learn how desktop virtualization can deliver the improved efficiency, stability, reliability and availability that is now critical for business success. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cost Savings with Centralized Virtual Desktops by Citrix

August 20, 2009 - (Free Research)
Centralized virtual desktops optimize the efficiency, security and flexibility of any PC environment. This white paper will look at the current cost of PC management and will explore how VDI can significantly reduce operational costs, and how TCO can vary depending on industry and user requirements. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Secure AND Cost-Efficient Desktop Virtualization by Citrix

December 31, 2013 - (Free Research)
This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing. 
(WHITE PAPER) READ ABSTRACT |

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos UK

March 16, 2009 - (Free Research)
The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine by SearchSecurity.com

October 31, 2013 - (Free Research)
Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change. 
(EZINE) READ ABSTRACT |

Best Practices for Making BYOD Simple and Secure by Citrix Systems, Inc. (E-mail this company)

March 30, 2012 - (Free Research)
This white paper presents practical guidance and best practices for using desktop virtualization, a self-service app store and secure file sharing and synchronization to deliver on-demand files, apps and desktops to any type of device, allowing organizations to leverage the full power of consumerization. 
(WHITE PAPER) READ ABSTRACT |

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 22, 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

BYOD 101: Combat the Phenomenon’s Top Challenges by SearchSecurity.com

June 19, 2012 - (Free Research)
In this e-guide from SearchConsumerization.com, uncover how to implement and enforce policies to improve your BYOD initiatives. Get the answers to your most pressing BYOD questions and also learn how desktop virtualization and application streamlining can help combat BYOD security challenges. 
(EGUIDE) READ ABSTRACT |

How to Secure Your Microsoft SharePoint Products by Thawte Inc.

May 22, 2013 - (Free Research)
This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order. 
(EGUIDE) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 18, 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Ways Desktop Virtualization Enhances Security by Citrix

December 31, 2013 - (Free Research)
This resource details the major components that make desktop virtualization secure by design. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Strategies for Secure Virtual Desktop Infrastructure by Citrix Systems, Inc. (E-mail this company)

October 17, 2013 - (Free Research)
Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

May 31, 2013 - (Free Research)
This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment. 
(WHITE PAPER) READ ABSTRACT |

Security and Data Protection with Intelligent Desktop Virtualization by Virtual Computer, Inc.

January 01, 2012 - (Free Research)
The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs. 
(WHITE PAPER) READ ABSTRACT |

Building a Secure and Compliant Windows Desktop by BeyondTrust Corporation

May 2008 - (Free Research)
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights. 
(WHITE PAPER) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

Empowering Information Security with Desktop Virtualization by Citrix

November 2013 - (Free Research)
This whitepaper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth. 
(WHITE PAPER) READ ABSTRACT |

How to Make Virtual Desktop Security Simpler and More Scalable by Citrix

April 2011 - (Free Research)
It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users. 
(WEBCAST) READ ABSTRACT |

Desktop Virtualization: The Key for Securing Your Enterprise by Citrix

October 2010 - (Free Research)
In this paper, Citrix® unveils how desktop virtualization provide IT organizations visibility and control over data to help achieve security and regulatory requirements, without compromising business performance, productivity, and the user experience. 
(WHITE PAPER)

IT Briefing: Desktop Virtualization for Mobile Users by Citrix

August 2010 - (Free Research)
In this IT Briefing, learn how to extend the benefits of desktop virtualization to mobile users. Discover a tool that enables users to achieve the benefits of virtual desktops through laptops. Learn about the advantages to this approach, including improved security and flexibility. 
(IT BRIEFING) READ ABSTRACT |

Citrix and Intel Deliver Client Virtualization by Citrix

June 2010 - (Free Research)
Citrix and Intel worked together to deliver local virtual machine desktops, aiming to make virtualization ubiquitous on client devices. The result of the collaboration is Citrix® XenClient™, a local desktop virtualization platform that provides new levels of security and user flexibility for enterprise desktops. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Dell DVS Enterprise - Mobile Secure Desktop by Dell and VMware

June 2013 - (Free Research)
This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device. 
(WHITE PAPER) READ ABSTRACT |

Citrix XenClient by Citrix

May 2010 - (Free Research)
Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.     
(PRODUCT DEMO)

Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI? by Dell Software

June 2009 - (Free Research)
This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more! 
(WEBCAST) READ ABSTRACT |

1 - 25 of 455 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts