Support Corporate SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Support Corporate Security returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Remote Access Technologies
 •   Mobile Device Management
 •   Wireless Security
 •   Application Management and Maintenance
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Virtualization

Related Searches
 •   Developments Support Corporate Security
 •   Global Support Corporate Security
 •   It Support Corporate Security
 •   Pos Support Corporate Security
 •   Secure Support
 •   Support Corporate Knowledge
 •   Support Corporate Record
 •   Support Implementing
 •   Support Portals
 •   Support Top
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Dimension Data Helps Purdue Pharma Deploy and Manage Unified Communications to Support Corporate Growth by Dimension Data

February 24, 2010 - (Free Research)
Read this case study to learn how Dimension Data’s managed services helped a pharmaceutical company replace a legacy phone system with a converged communications solution. 
(CASE STUDY) READ ABSTRACT |

Virtual desktops: preparing the enterprise for growth by Citrix

July 19, 2011 - (Free Research)
The ability to grow and quickly adapt to a changing marketplace is critical to any business and IT plays a critical role in providing an agile infrastructure that can quickly respond to meet business demands that enable growth.  This paper describes how desktop virtualization can support corporate growth initiatives. 
(WHITE PAPER) READ ABSTRACT |

Bringing Automation to the Data Center by CA Technologies.

October 2008 - (Free Research)
A number of factors have emerged that clearly demonstrate the requirement for a more holistic approach to data center management. 
(WHITE PAPER) READ ABSTRACT |

Apply the ITIL Framework with Confidence by TechExcel

August 2008 - (Free Research)
This whitepaper explains how ITIL provides the foundation for quality IT service management. It actively supports corporate goals by offering services that are based on efficient principles and adequately fulfilling business requirements. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by Alcatel-Lucent

April 2008 - (Free Research)
The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations. 
(WEBCAST) READ ABSTRACT |

The CIO's Guide to Mobile Security by BlackBerry

October 2006 - (Free Research)
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

State Agency Boost Security and Reduces Costs with GoToMyPC Corporate by Citrix Online

January 2005 - (Free Research)
The Texas Department of Family and Protective Services gives top priority to securing the information gathered for its investigations and cases. 
(CASE STUDY) READ ABSTRACT |

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

PC on a Stick: A Portable Endpoint Security Nightmare by Lumension

January 2007 - (Free Research)
Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns. 
(WHITE PAPER) READ ABSTRACT |

Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution by Citrix Online - GotoMyPC

January 2004 - (Free Research)
Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely. 
(CASE STUDY) READ ABSTRACT |

SUN SPARC® ENTERPRISE T5440 SERVER ARCHITECTURE by Sun Microsystems, Inc.

October 2008 - (Free Research)
Employing UltraSPARC® T2 Plus processors - an evolution of the industry's first massively threaded systems on a Chip (SoC) - the Sun SPARC® Enterprise T5440 server offers breakthrough performance and energy efficiency to drive Web 2.0 infrastructure and address other demanding datacenter challenges. 
(WHITE PAPER) READ ABSTRACT |

Applications and best practices to keep your mobile devices secure by SearchSecurity.com

March 2012 - (Free Research)
Uncover best practices for keeping your mobile devices and applications secure. 
(EGUIDE) READ ABSTRACT |

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network by Motorola, Inc.

May 2007 - (Free Research)
This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Securing mobile devices in the business environment by IBM

October 2011 - (Free Research)
As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

Guide to Deploying and Troubleshooting Video in the Enterprise by Fluke Networks

December 2010 - (Free Research)
Recently, a study commissioned by Cisco® Systems made a prediction that added a new word to the lexicon of the network engineer and IT director: zetabyte. The study predicted that by 2013, two-thirds of a zetabyte of video traffic would be on corporate networks. 
(WHITE PAPER) READ ABSTRACT |

Transitioning to an Information Infrastructure by EMC Corporation

August 2008 - (Free Research)
EMC helps IT focus on the importance of information and effectively manage it in the face of exponential growth, a dynamic regulatory environment and constantly changing business requirements on increasing revenue and profit. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

GoToAssist Corporate - Remote Support Made Easy™ by GoToAssist

July 2010 - (Free Research)
Citrix® GoToAssist® Corporate™ is a comprehensive and secure remote support solution that helps businesses increase revenue and reduce costs while improving customer satisfaction and problem resolution times. Continue reading this product overview to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Key E-Discovery Issues to Consider in 2011 by Dell, Inc.

May 2011 - (Free Research)
This white paper focuses on the key practices and technologies that organizations should pursue as they seek to improve their e-discovery practices and technologies. It also provides a brief overview on the relevant offerings from Dell. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts