Voice/data UserWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Voice/data User returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Asset Management (EAM)
 •   Telephony/ CTI/ VOIP
 •   Managed Service Provider (MSP)
 •   Network Management
 •   Telecom Auditing and Expense Management
 •   Vulnerability Assessment
 •   Intrusion Detection/ Forensics
 •   Access Control
 •   Communications Carriers
 •   Network Security

Related Searches
 •   B2C Voice/data User
 •   Equipment Voice/data
 •   Expense Voice/data User
 •   Intrastructures Voice/data User
 •   Skills Voice/data User
 •   Voice/data Contacts
 •   Voice/data User Kansas
 •   Voice/data User Measured
 •   Voice/data User Security
 •   Voice/data User Size
Advertisement

ALL RESULTS
1 - 25 of 444 | Next Page

Featured Sponsors

Enterprise Engineer 3.5 by McLaren Software.
McLaren's Enterprise Engineer application suite assures the integrity of your asset documentation, providing a single point of control to manage the lifecycle of asset related more...
>> Discover more offerings from McLaren Software.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Remote Access Your Users Will Love by Citrix

December 2013 - (Free Research)
This whitepaper introduces you to an approach to remote access that places focus on delivering the consistent, high-quality user experience workers need while still providing the administration and security support IT wants. 
(WHITE PAPER) READ ABSTRACT |

What defines an effective user experience? by Hewlett-Packard Limited

November 2013 - (Free Research)
In this on-demand webcast, learn what makes for an effective user experience and discover how the right user experience design service can help you find success. 
(WEBCAST) READ ABSTRACT |

Business Insight: Enabling User Mobility with Enterprise Security Solutions by Dell Software

February 2014 - (Free Research)
Learn how to enable user mobility without compromising security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. This white paper tells how to blend life and work activities – while keeping your data and resources secure. 
(WHITE PAPER) READ ABSTRACT |

User experience: is it just a 'nice to have'? by Hewlett-Packard Limited

February 2013 - (Free Research)
In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains why user experience is at the core of systems of engagement. 
(WEBCAST) READ ABSTRACT |

Importance of Information Governance for Business Users by RSD

April 2014 - (Free Research)
The following white paper explores the importance of information governance of business users and provides technology recommendations that can meet with the compliance and data needs of today's market. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Licensing Made Simple for Mobile Users, Desktop Virtualization and BYOD by Dell and Microsoft

April 2014 - (Free Research)
Watch this video to learn more about user-centric licensing, and how Microsoft and Dell are working together to make licensing simpler than ever before. 
(WEBCAST) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

You’ve tried VDI and failed…Now what? by SearchDataCenter.com

September 2011 - (Free Research)
In this videocast from industry experts Brian Madden and Gabe Knuth, learn how to deliver a native PC experience while still taking advantage of centralized images and management with desktop virtualization. 
(VIDEO) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Existing Application Monitoring Tools to Enhance the End-User Experience by Keynote Systems

February 2008 - (Free Research)
This white paper explores an end-to-end performance management platform that provides targeted diagnosis of Web application problems. 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Secure Remote Access your Users will Love by Citrix

January 2014 - (Free Research)
This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Secure AND Cost-Efficient Desktop Virtualization by Citrix

December 2013 - (Free Research)
This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing. 
(WHITE PAPER) READ ABSTRACT |

Managing Identities and Access in the Cloud by IBM

December 2011 - (Free Research)
Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data. 
(WHITE PAPER) READ ABSTRACT |

Data Security for Mobile Users: One Size Does Not Fit All by Accellion, Inc.

April 2014 - (Free Research)
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users. 
(WHITE PAPER) READ ABSTRACT |

How user experience is a business differentiator by Hewlett-Packard Limited

February 2013 - (Free Research)
In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience. 
(WEBCAST) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by Thawte Inc.

May 2011 - (Free Research)
Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet. 
(EGUIDE) READ ABSTRACT |

New Enterprise Desktop E-Zine Volume 2: User Virtualization - The Final Layer by Dell, Inc. and Intel®

November 2009 - (Free Research)
One barrier to the mass adoption of desktop virtualization is that users are often reluctant to surrender their highly personalized profiles. This issue of New Enterprise Desktop eZine takes a look at how user virtualization is breaking through this barrier-without taking away users' individuality. 
(EZINE) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

What Type of Virtualization Should You Use For Each User Segment? by Dell, Inc. and Intel®

December 2011 - (Free Research)
In lesson two of this desktop virtualization classroom, Brian Madden discusses how to segment your users and group them together to figure out what type of desktop virtualization you should use for different groups or users. Then he covers the specific desktop virtualization technologies and the pros and cons of each. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience by Knoa Software

September 2008 - (Free Research)
This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 444 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts