Work It Security AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Work It Security And returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Wireless Technologies and Mobile Computing
 •   Security Policies
 •   Virtualization
 •   Mobile Device Management
 •   Laptops/ Notebooks/ Tablet PCs
 •   Endpoint Security
 •   Security Monitoring
 •   Desktop Management

Related Searches
 •   Billing Work
 •   Demand Work
 •   Guides Work It
 •   Improvement Work
 •   Pos Work It Security
 •   Software Work It
 •   Work Article
 •   Work It Security Coding
 •   Work It Security Orders
 •   Work It Security Usa
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

How Consumerization Affects Security and Compliance by SearchSecurity.com

February 29, 2012 - (Free Research)
The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels. 
(EBRIEF) READ ABSTRACT |

Balancing Security and Usability of Mobile Devices by BlackBerry

July 24, 2012 - (Free Research)
This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability. 
(WHITE PAPER) READ ABSTRACT |

CW Special report on Symantec by ComputerWeekly.com

May 14, 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management by Novell, Inc.

October 06, 2009 - (Free Research)
Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats. 
(WHITE PAPER) READ ABSTRACT |

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business? by CA Technologies.

September 01, 2010 - (Free Research)
IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM. 
(WHITE PAPER) READ ABSTRACT |

Panda Security and Delta Wines - Case Study by Panda Security

July 15, 2013 - (Free Research)
Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up. 
(CASE STUDY) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 01, 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Media Conversion in Video Security and Surveillance Systems by Transition Networks, Inc.

September 2008 - (Free Research)
This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice. 
(WHITE PAPER) READ ABSTRACT |

Citrix and Intel Deliver Client Virtualization by Citrix

June 2010 - (Free Research)
Citrix and Intel worked together to deliver local virtual machine desktops, aiming to make virtualization ubiquitous on client devices. The result of the collaboration is Citrix® XenClient™, a local desktop virtualization platform that provides new levels of security and user flexibility for enterprise desktops. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Specific Solutions to Optimise Productivity, Maintain Security and Maximise Investment: Research and Test Labs by Avocent

May 2014 - (Free Research)
This video talks about a high-performance remote access and control solution that delivers optimized productivity and security while also maximizing initial investment. 
(VIDEO) READ ABSTRACT |

Increasing Performance, Security, and Manageability on Desktops and Notebooks with Intel® Core™2 Processor with vPro™ Technology and Windows® 7 by Dell, Inc. and Intel®

October 2009 - (Free Research)
Technical decision makers are faced with many challenges in today's economy: help users get more work done faster and with fewer difficulties, protect the network and individual systems from attacks or malicious code, and much more. Find out how the Intel Core 2 processor with vPro technology complements the new Windows 7 operating system. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Five Things You Must Do Before Letting Your Employees Work From Anywhere by Dell, Inc. and Intel®

July 2012 - (Free Research)
This presentation transcript explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Taking the Leap to Virtualization by Symantec Corporation

December 2011 - (Free Research)
This short white paper explores key questions you need to ask as you migrate to the virtualized environment to ensure your data remains safe and that you are able to fully reap the benefits that virtualization offers. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

5 Things You Must Do Before Letting Your Employees Work From Anywhere by Dell, Inc. and Intel®

June 2012 - (Free Research)
This webcast explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy. 
(WEBCAST) READ ABSTRACT |

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks by Absolute Software

December 2009 - (Free Research)
Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Back to the Future: The New IT Infrastructure Opportunity by Avocent

June 2011 - (Free Research)
Access this exclusive resources to discover new technology and solutions to address security and operating expense (OPEX) issues related to distributed computing such as thin client, fast client, diskless workstations, SaaS, and VDI. 
(WHITE PAPER) READ ABSTRACT |

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.

February 2011 - (Free Research)
Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Improved network security with IP and DNS reputation by Hewlett-Packard Company

September 2010 - (Free Research)
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks. Download this paper from HP Networking to learn how to defend IT assets and business reputation. 
(WHITE PAPER) READ ABSTRACT |

Integrating Vulnerability Assessment and Remediation by Lumension

August 2008 - (Free Research)
An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts