IT Agents  >   Information Technology End Users  >  

Remote Users

RSS Feed    Add to Google    Add to My Yahoo!
Remote UsersReports
26 - 50 of 184 Matches Previous Page  | Next Page
Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: This whitepaper introduces you to an approach to remote access that places focus on delivering the consistent, high-quality user experience workers need while still providing the administration and security support IT wants.
Posted: 03 Dec 2013 | Published: 03 Dec 2013

Citrix

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

4 Reasons To Go Beyond VMware View with Citrix XenDesktop
sponsored by Citrix
WHITE PAPER: This paper explores the four key comparison points between View and solutions powered by Citrix XenDesktop when it comes to mobile desktop support.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Mobility is here to stay – Is your data is backed up?
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by SearchSecurity.com
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

Managing a Mobile Workforce: Support and Motivate Your Remote Staff
sponsored by Ultimate Software
WHITE PAPER: This resource explores the growth of mobile technology and the rise of the teleworker, and details how cloud-based human capital management (HCM) can enable you to support, engage, and motivate your virtual employees more easily and effectively.
Posted: 24 Jul 2013 | Published: 31 Mar 2013

Ultimate Software

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Deploying Communications and Collaborations Solutions for Your Medium-Sized Business
sponsored by Cisco
WHITE PAPER: This resource examines the challenges that medium-sized businesses face in identifying communications and collaboration solutions that meet today's business requirements, and explores how cloud communication and collaboration technologies can help organizations to resolve these issues.
Posted: 15 Jul 2013 | Published: 29 Mar 2013

Cisco

Avaya CS 1000: Defining Calling Line Identification Numbers
sponsored by Global Knowledge
WHITE PAPER: This white paper describes a two-part process used to define CLID information for both emergency and non-emergency calls. The first part involves defining the number(s) that will be sent to the called party. The second part of the process involves assigning the CLID entry to an analog telephone or to a key on a digital or IP telephone.
Posted: 14 Jun 2013 | Published: 16 May 2013

Global Knowledge

Protecting Critical Business Information Beyond the Data Center
sponsored by HP Autonomy
WHITE PAPER: Discover why data protection for distributed environments differs from traditional server backup and recovery strategies and view a list of considerations you should use to evaluate potential service providers to ensure you find one that best aligns with your business needs.
Posted: 12 Jun 2013 | Published: 12 Mar 2013

HP Autonomy

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Top 10 Reasons MDM is just a Fad
sponsored by Fiberlink
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 May 2013 | Published: 16 May 2013

Fiberlink

The Evolution of Collaboration: Tying the Knot with UC
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchUnifiedCommunications.com, we explore the evolving relationship between unified communications (UC) and collaboration and explain why UCC is a match that can benefit any organization.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

SearchSecurity.com

Four Citrix customers enable anywhere, any device CAD productivity
sponsored by Citrix
CASE STUDY: This whitepaper highlights 3 key priorities virtual desktops address by examining 4 companies that have used centralization to improve business processes.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA, The Security Division of EMC

Jabra - Devices Make Experiences: Company Profile
sponsored by Insight and Jabra
WHITE PAPER: In this resource, explore a series of hands-free devices that will enable your mobility initiatives to soar, truly enabling a productive workforce.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

Insight and Jabra

Delivering IT to the Virtual Workforce
sponsored by Citrix
WHITE PAPER: Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.
Posted: 13 Aug 2013 | Published: 30 Jun 2011

Citrix

Endpoint Security Suites Take Center Stage in the Enterprise
sponsored by Symantec Corporation
ANALYST REPORT: This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.
Posted: 29 Jul 2013 | Published: 04 Jan 2013

Symantec Corporation

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

The Truth About Working from Anywhere - Part 2: Best Practices for Working on the Go
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This best practices guide provides guidance to help you more effectively and efficiently operate as a mobile worker. Inside, find advice to help you drive success with mobile work at home and on the road, as well as tips for increasing mobile communication.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Citrix Online Go To Meeting

Expert Advice: How App Delivery Optimization Tools Can Satisfy Your Business Needs
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: In this first section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization, we take a look at the business and technology issues driving ADO adoption and the benefits of deploying an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Virtualization of Video Infrastructure
sponsored by Vidyo, Inc.
WHITE PAPER: As virtualization spreads users across the globe, organizations are seeking solutions to keep their users connected. View this white paper to learn how the virtualization of video is helping make these options more affordable and flexible for businesses today.
Posted: 07 May 2013 | Published: 31 Jan 2013

Vidyo, Inc.

Troubleshooting Your Network Without Breaking the Bank
sponsored by Riverbed Technology, Inc.
WHITE PAPER: As a network manager, application manager or security manager, you need systems that can collect data across your WAN, continuously analyze the data to discover problems, and troubleshoot issues as soon as they occur. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more.
Posted: 23 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

Remote Monitoring and Management Tools Selection Tips for Solution Providers
sponsored by N-able Technologies
EGUIDE: This E-Guide from MicroScope.co.UK offers advice that will help MSPs and VARs find the ideal remote monitoring and management (RMM) solution for their organization.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

N-able Technologies

Beyond Business as Usual: The Mega Shift Toward Social Communications
sponsored by IBM
WHITE PAPER: Discover how integrating social software with communications is transforming the modern workplace, maximizing the potential of human capital, and generating value for businesses worldwide.
Posted: 09 Apr 2013 | Published: 02 Oct 2012

IBM
26 - 50 of 184 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement