IT Agents  >   Information Technology End Users  >  

Remote Users

RSS Feed    Add to Google    Add to My Yahoo!
Remote UsersReports
26 - 50 of 190 Matches Previous Page  | Next Page
HP EliteBook Revolve- Datasheet
sponsored by Insight and HP
DATA SHEET: Access this white paper for an introduction to the HP Elitebook Revolve, a notebook that transforms into a tablet to give you the best of both worlds – providing the flexibility and agility you need to truly make the most of today's IT consumerization and BYOD trends.
Posted: 04 Mar 2014 | Published: 28 Feb 2013

Insight and HP

Everything a business Ultrabook™should be: HP EliteBook Folio
sponsored by Insight and HP
WHITE PAPER: View this white paper for an introduction to the HP EliteBook Folio, an enterprise-ready, IT-friendly laptop featuring an advanced design, long-lasting battery life and an integrated suite of tools designed to help you operate as productively and efficiently as possible.
Posted: 04 Mar 2014 | Published: 31 Jul 2012

Insight and HP

Elite Pad Datasheet: The true tablet for business
sponsored by Insight and HP
WHITE PAPER: View this white paper for an introduction to a tablet that's truly built for business. Download now for a quick overview of the key features and benefits this hardware has to offer!
Posted: 04 Mar 2014 | Published: 31 Oct 2012

Insight and HP

Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

Single Point of Access, Single Point of Control
sponsored by Citrix
WHITE PAPER: Read on to learn how desktop virtualization can help support remote connectivity better than VPN.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

Citrix

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Mobility is here to stay – Is your data is backed up?
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

Swisscomm Uses HP Security to Provide Superior and Secure Client Services
sponsored by Hewlett-Packard Limited
VIDEO: Providing superior – and secure – services to clients is Swisscom's greatest goal. This quick video reveals how they have achieved the security needed, and who provides it. View now to learn more!
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by SearchSecurity.com
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

Managing a Mobile Workforce: Support and Motivate Your Remote Staff
sponsored by Ultimate Software
WHITE PAPER: This resource explores the growth of mobile technology and the rise of the teleworker, and details how cloud-based human capital management (HCM) can enable you to support, engage, and motivate your virtual employees more easily and effectively.
Posted: 24 Jul 2013 | Published: 31 Mar 2013

Ultimate Software

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Avaya CS 1000: Defining Calling Line Identification Numbers
sponsored by Global Knowledge
WHITE PAPER: This white paper describes a two-part process used to define CLID information for both emergency and non-emergency calls. The first part involves defining the number(s) that will be sent to the called party. The second part of the process involves assigning the CLID entry to an analog telephone or to a key on a digital or IP telephone.
Posted: 14 Jun 2013 | Published: 16 May 2013

Global Knowledge

Protecting Critical Business Information Beyond the Data Center
sponsored by HP Autonomy
WHITE PAPER: Discover why data protection for distributed environments differs from traditional server backup and recovery strategies and view a list of considerations you should use to evaluate potential service providers to ensure you find one that best aligns with your business needs.
Posted: 12 Jun 2013 | Published: 12 Mar 2013

HP Autonomy

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Top 10 Reasons MDM is just a Fad
sponsored by Fiberlink
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 May 2013 | Published: 16 May 2013

Fiberlink

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Four Citrix customers enable anywhere, any device CAD productivity
sponsored by Citrix
CASE STUDY: This whitepaper highlights 3 key priorities virtual desktops address by examining 4 companies that have used centralization to improve business processes.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA

Jabra - Devices Make Experiences: Company Profile
sponsored by Insight and Jabra
WHITE PAPER: In this resource, explore a series of hands-free devices that will enable your mobility initiatives to soar, truly enabling a productive workforce.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

Insight and Jabra

Delivering IT to the Virtual Workforce
sponsored by Citrix
WHITE PAPER: Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.
Posted: 13 Aug 2013 | Published: 30 Jun 2011

Citrix

Endpoint Security Suites Take Center Stage in the Enterprise
sponsored by Symantec Corporation
ANALYST REPORT: This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.
Posted: 29 Jul 2013 | Published: 04 Jan 2013

Symantec Corporation

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

The Truth About Working from Anywhere - Part 2: Best Practices for Working on the Go
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This best practices guide provides guidance to help you more effectively and efficiently operate as a mobile worker. Inside, find advice to help you drive success with mobile work at home and on the road, as well as tips for increasing mobile communication.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Citrix Online Go To Meeting

Expert Advice: How App Delivery Optimization Tools Can Satisfy Your Business Needs
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: In this first section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization, we take a look at the business and technology issues driving ADO adoption and the benefits of deploying an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks
26 - 50 of 190 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement