Security Tandberg ManageWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Tandberg Manage returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Managed Security Services
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Application Security
 •   Wireless Security
 •   Managed Service Provider (MSP)

Related Searches
 •   Building Security Tandberg Manage
 •   Cycles Security Tandberg Manage
 •   Guidelines Security
 •   Hardware Security Tandberg Manage
 •   International Security
 •   Security Accounting
 •   Security Tandberg Iowa
 •   Security Tandberg Manage Canadian
 •   Security Tandberg Manage Control
 •   Top Security Tandberg
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Roadmap to UC Projects that Reap Rewards by SearchUnifiedCommunications.com E-Books

November 09, 2009 - (Free Research)
This e-book provides a roadmap for building a unified communications business case and offers practical strategies for implementing short-term projects with long-term payback, establishing metrics for ROI evaluation, and setting the stage for adoption of richer collaboration capabilities in the future. 
(EBOOK) READ ABSTRACT |

University of Houston-Downtown Expands Its Video Horizons by RADVISION

June 2008 - (Free Research)
The University of Houston-Downtown (UHD) needed to replace its existing video network infrastructure (MCUs) with a reliable, robust platform that delivered value added features, such as firewall traversal and high definition support. 
(CASE STUDY) READ ABSTRACT |

Collaboration One of the Fundamental Engines of Lean Initiatives - Avoiding the Eighth Deadly Waste by TANDBERG, now part of Cisco

March 2008 - (Free Research)
This white paper details best practices for implementing video communication into an organization and highlights a number of companies that have successfully done so. 
(WHITE PAPER) READ ABSTRACT |

Managing Mobile Devices: The New MSP Opportunity by N-able Technologies

December 2012 - (Free Research)
This exclusive resource explores how MSPs manage the proliferation of mobile computing in the workplace and the implementation of a mobile manager approach that integrates MDM with RMM, strengthening customer relationships and boosting business longevity. 
(WHITE PAPER) READ ABSTRACT |

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email by Coviant Software Corporation

December 2010 - (Free Research)
Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers. 
(WHITE PAPER) READ ABSTRACT |

Simplifying management and lowering total cost of ownership for SSL certificates by GlobalSign

May 2011 - (Free Research)
This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL. 
(WHITE PAPER) READ ABSTRACT |

Client Management Best Practices for Managing Mac Systems by CDW

April 2010 - (Free Research)
One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Managed DDos Protection by Neustar®

November 2011 - (Free Research)
This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service. 
(WHITE PAPER) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2009 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST NEWS) READ ABSTRACT |

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.

August 2011 - (Free Research)
Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk. 
(WHITE PAPER) READ ABSTRACT |

Realizing Business Value in Managed File Transfer by GlobalScape

April 2008 - (Free Research)
Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data. 
(WHITE PAPER) READ ABSTRACT |

Using SLAs to Gain a Competitive Advantage by BlueCoat

December 2008 - (Free Research)
This whitepaper will discuss these managed service trends and challenges, and will identify the steps to success to meet customers. Escalating application and security requirements. 
(ANALYST REPORT) READ ABSTRACT |

A Guide to Understanding Hosted and Managed Messaging - An Osterman Research White Paper by ZANTAZ

January 2008 - (Free Research)
Email messaging is a mission-critical function for virtually all organizations and it is becoming more so. Learn how you can manage email to meet regulation requirements, increase messaging security and reliability, and streamline storage... 
(WHITE PAPER) READ ABSTRACT |

A CIO's Five-Point Plan for Managing Endpoint Security by Dell KACE

June 2013 - (Free Research)
Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Why Managed DNS Services and Why Now? by Verisign, Inc.

June 2011 - (Free Research)
In this webinar Yankee Group presents its Managed DNS Service Bill of Rights - what Enterprises need to expect and demand from a managed DNS service provider. 
(WEBCAST)

Complex Managed Hosting: Market Survey and Vendor Feature Comparison by Connectria Hosting

August 2010 - (Free Research)
In its most sophisticated form, complex managed hosting, companies can outsource high-level IT functions such as OS management, virtualization, load balancing, performance monitoring, security and more. Read this market survey to get a comparison of the different features offered by complex managed hosting companies. 
(WHITE PAPER) READ ABSTRACT |

Overview of Cloud-Managed WiFi: The Next Step in Wireless Evolution by Meraki

August 2010 - (Free Research)
Learn how you can get a cost-effective, simple, and secure network with a centralized control system to help your IT team. 
(PODCAST) READ ABSTRACT |

How to Choose a Managed Network Services Provider by MegaPath Inc.

May 2012 - (Free Research)
Managing your network is no easy task, hence the reason managed service providers (MSPs) exist. In this resource, explore the advantages of outsourcing to an MSP and best practices for finding the right MSP for your organization. 
(WHITE PAPER) READ ABSTRACT |

New Security Solutions Using Intel® vPro™ Technology by Intel

February 2012 - (Free Research)
This white paper introduces a new technology aimed at increasing your ability to manage, maintain and protect PCs without burdening your budget. Learn all about its ability to securely manage PCs over various networks and discover 10 additional security use cases for this advanced platform.    
(WHITE PAPER)

Maintaining security in managed services by SecureWorks

December 2011 - (Free Research)
Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model. 
(EGUIDE) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Simplifying Network Security with a Single Source Provider by Perimeter eSecurity

December 2008 - (Free Research)
Read this whitepaper for a look at how, if done properly, reducing the number of security vendors or only selecting one vendor for multiple services is a great way for organizations to manage costs, obtain needed expertise, and expand security services. 
(WHITE PAPER) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2005 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST REPORT)

Managed Data Backup Using Cloud-Based Solutions: Help Protect Your Data with a Cost-Effective, Managed Backup Solution by IBM

August 2011 - (Free Research)
How does your organization manage and protect mission critical data? This can be a challenge when faced with rapid information growth and potential outages. This data sheet discusses how IBM can help you protect data, reduce costs and meet compliance requirements. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts