Hardware  >   Computer Hardware  >   Personal Computers  >  

Laptops

RSS Feed    Add to Google    Add to My Yahoo!
LaptopsWhite Papers (View All Report Types)
 
Protecting Data at the Edge More Effectively
sponsored by CommVault Systems, Inc.
WHITE PAPER: Access this resource to discover a platform that manages and protects all of your data, no matter where it may be in today's fluid business environment.
Posted: 07 Feb 2014 | Published: 31 Dec 2013

CommVault Systems, Inc.

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell Software
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 15 Nov 2012 | Published: 15 Nov 2012

Dell Software

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
sponsored by Symantec Corporation
WHITE PAPER: Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Symantec Corporation

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Cloud-based File Management System for BlackBerry PlayBook Tablet Customers
sponsored by BlackBerry
WHITE PAPER: Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Cost-effective Data Protection for Microsoft Windows Environments
sponsored by Zmanda Inc.
WHITE PAPER: This whitepaper discusses the challenges of protecting Microsoft Windows files, databases, and email applications within a heterogeneous IT environment; and demonstrates how Amanda Enterprise, combined with its clients and agents.
Posted: 01 Aug 2008 | Published: 01 Aug 2008

Zmanda Inc.

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers
sponsored by Sophos, Inc.
WHITE PAPER: Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption.
Posted: 17 Jul 2009 | Published: 01 Jun 2009

Sophos, Inc.

Mobilize to Rightsize Your Network
sponsored by Aruba Networks
WHITE PAPER: Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!
Posted: 30 May 2012 | Published: 14 Mar 2011

Aruba Networks

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement