Standards  >  

Terminal Emulation Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Terminal Emulation Protocols Reports
 
Pinewood Studios: Desktop Area Networking and KVM over IP Switching
sponsored by Avocent
CASE STUDY: This white paper explains how Pinewood Studios, a film television and commercial production based in England, was able to create access to servers located in one secure area from various workstation positions – with no previous infrastructure in place.
Posted: 14 May 2014 | Published: 14 May 2014

Avocent

E-Book: Strategic guide to insider threat detection and breach response
sponsored by SearchSecurity.com
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SearchSecurity.com

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Optimizing Microsoft® SharePoint with Dell
sponsored by Dell and Microsoft
WHITE PAPER: The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell and Microsoft

Enable an Empowered and Distributed Workforce Through Managed Remote Services
sponsored by AT&T Corp
WHITE PAPER: To react quickly to customers’ needs, organizations are decentralizing their workforce and shifting them into the flow of their customers’ lives.
Posted: 27 Oct 2011 | Published: 27 Oct 2011

AT&T Corp

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA

Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement