Software  >   Systems Software  >   Security Software  >  

Device Control Software

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Software that denies access to any devices plugged in to the PC, for instance flash drives, WiFi and Bluetooth adapters, CD-ROM drives, and USB devices such as printers, scanners, keyboards, and mice.
Device Control SoftwareReports
1 - 25 of 29 Matches Previous Page  | Next Page
Effectively Managing BYOD in your Organization
sponsored by TechTarget
RESOURCE: Does your organization know how to improve efficiency and safe money through the use of employees using tablets and smartphones for work? Take our brief survey on mobile devices and in return you will gain immediate access to our eguide, Juggling management and benefits of BYOD in the enterprise & beyond.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

TechTarget

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Mobile Device Ownership: How to Choose the Right Mix
sponsored by BlackBerry
WHITE PAPER: It's clear that when it comes to planning and implementing a mobility strategy, there is no "one size fits all" policy that fits every organisation. This white paper provides readers with answers to many questions CIOs are asking, and much more.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

BlackBerry

Mobile Device Ownership: How to Choose the Right Mix
sponsored by BlackBerry
WHITE PAPER: It's clear that when it comes to planning and implementing a mobility strategy, there is no "one size fits all" policy that fits every organization. This white paper provides readers with answers to many questions CIOs are asking, and much more.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

BlackBerry

Tapping into the Bring Your Own Device Shift
sponsored by Workforce Software
WHITE PAPER: This white paper explores the BYOD trend, examines its intersections with workforce management, and provides recommendations on how you can maximize your workforce management ROI in an increasingly mobile environment.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Workforce Software

Timely Topics: Enterprise BYOD
sponsored by Workforce Software
WHITE PAPER: This informative paper helps outline some ways to control the risks of BYOD and addresses other factors that influence your decision to establish a BYOD policy. Discover the compelling advantages of BYOD that will have your leaders deciding "when," not "if," to implement this mobile strategy.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Workforce Software

Essential Enterprise Mobile Security Controls
sponsored by SearchSecurity.com
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

Lumension Guide to Device Control Best Practices
sponsored by Lumension
WHITE PAPER: Download this exclusive whitepaper now for an in-depth guide on how to install one device control and endpoint management security suite into your security approach.
Posted: 17 Sep 2012 | Published: 14 Sep 2012

Lumension

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

HP Device Manager 4.5 User Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett-Packard Company

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky Lab
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky Lab

Computer Weekly - 17 April 2012: How to ensure smartphone security
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT.
Posted: 16 Apr 2012 | Published: 17 Apr 2012

ComputerWeekly.com

Presentation Transcript: Revelations and Realities of Endpoint Security
sponsored by GFI Software
PRESENTATION TRANSCRIPT: Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

GFI Software

Protect Your Data from Endpoint to the Cloud
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro Data Protection rises to the occasion with a robust solution that ensures the availability, integrity, and confidentiality of your business information. This comprehensive solution keeps your data safe from intentional or unintentional harm wherever it resides, protecting it against damage, loss, and unauthorized access. 
Posted: 22 Mar 2011 | Published: 21 Mar 2011

Trend Micro, Inc.

Transform with Mobile Apps
sponsored by AT&T Corp
WEBCAST: It’s time to start thinking strategically about enterprise mobile applications. Outside of a few vertical industries, IT isn’t able to enforce a single device platform or OS. Applications are being requested for a wider range of devices, and more end-user applications are coming from outside IT.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Free Software – Solve Common LAN problems with Switch Port Monitor Utility
sponsored by Fluke Networks
SOFTWARE DOWNLOAD: For the majority of enterprises, the switch is the key network device, so visibility into the switch is necessary to thoroughly understand what’s actually happening on the network. Fluke Networks' free Switch Port Monitor software provides detailed information by port such as interface name, speed, status, packet activity and so much more.
Posted: 12 Oct 2010 | Premiered: 12 Oct 2010

Fluke Networks

Trusted Computing: Establishing Device Authentication
sponsored by Wave Systems Corp.
VIDEOCAST: View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

Adopting iPad for Enterprise Use. Register Now!
sponsored by Sybase, an SAP company
WEBCAST: There is little doubt that Apple's iPad and iPhone will become valuable enterprise productivity tools. Watch this Sybase webcast and learn why IT departments should consider iPad and iPhone when planning new enterprise mobility strategies.
Posted: 26 Jul 2010 | Premiered: Jul 26, 2010

Sybase, an SAP company

E-guide-- Endpoint security suites: What to consider before renewal
sponsored by ESET
EGUIDE: In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

ESET

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints
sponsored by Panda Security
EGUIDE: In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information.
Posted: 30 Sep 2009 | Published: 30 Sep 2009

Panda Security

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Implementing Device Restrictions in Vista and Server 2008
sponsored by Global Knowledge
WHITE PAPER: With Vista clients and Server 2008 systems, we have a number of new Group Policy settings that allow us to exert some level of control over which devices users can install and use.
Posted: 23 Jan 2009 | Published: 23 Jan 2009

Global Knowledge

How BMC Is Scaling Agile Development
sponsored by Rally Software
WHITE PAPER: This whitepaper describes how BMC Software's Infrastructure Management Group transformed their development organization using agile development practices management applications from Rally Software Development.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Rally Software
1 - 25 of 29 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement