IT Agents  >   Information Technology End Users  >  

Remote Users

RSS Feed   
Remote Users Reports
51 - 75 of 113 Matches Previous Page  |  Next Page
Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by SearchSecurity.com
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

SearchSecurity.com

The connected enterprise: Leveraging cloud services for branch office integration
sponsored by SearchSecurity.com
EGUIDE: This SearchUnifiedCommunications.com E-Guide explores the benefits and challenges of unified communications (UC) virtualization and uncovers how to tackle virtual UC and VDI for your distributed enterprise.
Posted: 21 May 2012 | Published: 21 May 2012

SearchSecurity.com

Collaboration: Decision Time: Product Benefits and Tradeoffs
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchUnifiedCommunications.com's three-part guide on collaboration products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a collaboration solution.
Posted: 11 May 2012 | Published: 11 May 2012

SearchSecurity.com

Collaboration: Assessing the Business/Technology Issue
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchUnifiedCommunications.com’s three-part guide on selecting collaboration products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of collaboration solutions.
Posted: 11 May 2012 | Published: 11 May 2012

SearchSecurity.com

IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012

SearchSecurity.com

How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

SearchSecurity.com

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Network Evolution: Building the Infrastructure to Enable the Changing Face of IT
sponsored by OnX USA LLC
EZINE: This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets.
Posted: 14 Jun 2012 | Published: 02 Apr 2012

OnX USA LLC

The Quest for Killer SIP Apps
sponsored by NACR
WEBCAST: Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!
Posted: 13 Jun 2012 | Premiered: May 31, 2012

NACR

Dell Desktop Virtualization Solutions Simplified
sponsored by Citrix Systems, Inc.
WHITE PAPER: Explore how all-in-one, out-of-the-box VDI appliances are simplifying and accelerating desktop virtualization implementations for both large enterprises and SMBs.
Posted: 12 Jun 2012 | Published: 08 Feb 2012

Citrix Systems, Inc.

A Business Guide to MPLS IP VPN Migration: Five Critical Factors
sponsored by XO Communications
WHITE PAPER: Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs.
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

How to Choose a Managed Network Services Provider
sponsored by MegaPath Inc.
WHITE PAPER: Managing your network is no easy task, hence the reason managed service providers (MSPs) exist. In this resource, explore the advantages of outsourcing to an MSP and best practices for finding the right MSP for your organization.
Posted: 23 May 2012 | Published: 22 May 2012

MegaPath Inc.

Remote Access Problems: BYOD Muddies the Water
sponsored by Carousel Industries
EGUIDE: This expert E-Guide from SearchEnterpriseWAN.com explores the challenges many organizations face when it comes to remote access and pays special attention to the security concerns BYOD brings to your enterprise.
Posted: 21 May 2012 | Published: 18 May 2012

Carousel Industries

Achieve Centralized Decision-Making with a Branch Network Infrastructure
sponsored by NACR
EGUIDE: As organizations grow more distributed, centralized decision-making becomes even harder to accomplish. This E-Guide from SearchNetworking.com offers best practices for bridging the information gap to help ensure successful decision-making.
Posted: 03 May 2012 | Published: 03 May 2012

NACR

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by SearchNetworking.com
EZINE: In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

SearchNetworking.com

MPLS VPN Tutorial: What you should know
sponsored by XO Communications
EGUIDE: In this expert E-Guide from SearchEnterpriseWAN.com, explore the next generation of networks: Multiprotocol Label Switching (MPLS) networks.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

XO Communications

Simply Connecting Campus
sponsored by Juniper Networks, Inc.
PRESENTATION TRANSCRIPT: Mobile devices are taking over campus and branch networks. Do you know how to prepare for this influx?
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Changing the Conversation in the Workplace
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Uncover analysis of the findings in two surveys revealing workers’ attitudes about employee engagement, productivity, and communication technologies.
Posted: 09 Feb 2012 | Published: 09 Feb 2012

Alcatel-Lucent Enterprise

Address Management Challenges with Prime for Enterprise
sponsored by Cisco Systems, Inc.
PRODUCT OVERVIEW: Managing your network is never without problems. Discover a solution that can simplify it.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

Cisco Systems, Inc.

Presentation Transcript: How Consumerization is Reshaping the Workplace
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Access this presentation transcript of a webcast that explored the challenges the consumerization of IT has brought (and will continue bringing) to today’s enterprises.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Hewlett Packard Enterprise

The Key for Securing Your Enterprise
sponsored by Citrix
WHITE PAPER: Desktop virtualization, which can help organizations  strengthen information security while enhancing business productivity, agility and growth, is a promising solution. Learn how desktop virtualization is redefining desktop and application delivery in this resource.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Citrix

E-Guide: Best Practices for the wireless branch office network
sponsored by Aerohive Networks
EGUIDE: Access this expert E-Guide to learn what networking vendors are doing to address the challenges of adding Wi-Fi in branch office networks, as well as what you should look for in wireless branch office networks to ensure success.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Aerohive Networks

What Type of Virtualization Should You Use For Each User Segment?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In lesson two of this desktop virtualization classroom, Brian Madden discusses how to segment your users and group them together to figure out what type of desktop virtualization you should use for different groups or users. Then he covers the specific desktop virtualization technologies and the pros and cons of each.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®
51 - 75 of 113 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement