IT Agents  >   Information Technology End Users  >  

Remote Users

RSS Feed   
Remote Users Reports
51 - 75 of 118 Matches Previous Page  |  Next Page
Key Insights for Building “Consumerised” End-User Services
sponsored by ComputerWeekly.com
IT BRIEFING: This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.
Posted: 29 Nov 2012 | Published: 05 Oct 2011

TOPICS: 
ComputerWeekly.com

Rethinking MDM in a BYOD World
sponsored by SearchSecurity.com
WHITE PAPER: Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected.
Posted: 01 Nov 2012 | Published: 01 Nov 2012

TOPICS: 
SearchSecurity.com

The Social Collaboration Revolution: Keeping Your Dispersed Enterprise Connected
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the market drivers for unified communications and collaboration in the dispersed workplace and details a technology that has set its sights on revolutionizing the world of social collaboration.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

TOPICS: 
SearchSecurity.com

Business Collaboration Benefits: 10 Questions to Ask Your Potential Vendors
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com describes the need for collaboration in a geographically dispersed enterprise and highlights the top ten questions you should ask any potential collaboration vendor.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

TOPICS: 
SearchSecurity.com

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by SearchSecurity.com
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

TOPICS: 
SearchSecurity.com

The connected enterprise: Leveraging cloud services for branch office integration
sponsored by SearchSecurity.com
EGUIDE: This SearchUnifiedCommunications.com E-Guide explores the benefits and challenges of unified communications (UC) virtualization and uncovers how to tackle virtual UC and VDI for your distributed enterprise.
Posted: 21 May 2012 | Published: 21 May 2012

TOPICS: 
SearchSecurity.com

Collaboration: Decision Time: Product Benefits and Tradeoffs
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchUnifiedCommunications.com's three-part guide on collaboration products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a collaboration solution.
Posted: 11 May 2012 | Published: 11 May 2012

TOPICS: 
SearchSecurity.com

Collaboration: Assessing the Business/Technology Issue
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchUnifiedCommunications.com’s three-part guide on selecting collaboration products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of collaboration solutions.
Posted: 11 May 2012 | Published: 11 May 2012

TOPICS: 
SearchSecurity.com

IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012

TOPICS: 
SearchSecurity.com

How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

TOPICS: 
SearchSecurity.com

Presentation Transcript: Optimizing the WAN for Real Time Traffic
sponsored by Talari_DON'T USE
PRESENTATION TRANSCRIPT: Explore why legacy wide area networks (WANs) cannot handle the pressures of real-time traffic and uncover how WAN virtualization can help solve these performance problems.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

TOPICS: 
Talari_DON'T USE

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

TOPICS: 
Dell Software

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

TOPICS: 
Polycom, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

TOPICS: 
SysAid Technologies Ltd

Network Evolution: Building the Infrastructure to Enable the Changing Face of IT
sponsored by OnX USA LLC
EZINE: This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets.
Posted: 14 Jun 2012 | Published: 02 Apr 2012

TOPICS: 
OnX USA LLC

The Quest for Killer SIP Apps
sponsored by NACR
WEBCAST: Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!
Posted: 13 Jun 2012 | Premiered: May 31, 2012

TOPICS: 
NACR

Dell Desktop Virtualization Solutions Simplified
sponsored by Citrix Systems, Inc.
WHITE PAPER: Explore how all-in-one, out-of-the-box VDI appliances are simplifying and accelerating desktop virtualization implementations for both large enterprises and SMBs.
Posted: 12 Jun 2012 | Published: 08 Feb 2012

TOPICS: 
Citrix Systems, Inc.

A Business Guide to MPLS IP VPN Migration: Five Critical Factors
sponsored by XO Communications
WHITE PAPER: Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs.
Posted: 25 May 2012 | Published: 30 Apr 2012

TOPICS: 
XO Communications

How to Choose a Managed Network Services Provider
sponsored by MegaPath Inc.
WHITE PAPER: Managing your network is no easy task, hence the reason managed service providers (MSPs) exist. In this resource, explore the advantages of outsourcing to an MSP and best practices for finding the right MSP for your organization.
Posted: 23 May 2012 | Published: 22 May 2012

TOPICS: 
MegaPath Inc.

Remote Access Problems: BYOD Muddies the Water
sponsored by Carousel Industries
EGUIDE: This expert E-Guide from SearchEnterpriseWAN.com explores the challenges many organizations face when it comes to remote access and pays special attention to the security concerns BYOD brings to your enterprise.
Posted: 21 May 2012 | Published: 18 May 2012

TOPICS: 
Carousel Industries

Achieve Centralized Decision-Making with a Branch Network Infrastructure
sponsored by NACR
EGUIDE: As organizations grow more distributed, centralized decision-making becomes even harder to accomplish. This E-Guide from SearchNetworking.com offers best practices for bridging the information gap to help ensure successful decision-making.
Posted: 03 May 2012 | Published: 03 May 2012

TOPICS: 
NACR

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by SearchNetworking.com
EZINE: In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

TOPICS: 
SearchNetworking.com

MPLS VPN Tutorial: What you should know
sponsored by XO Communications
EGUIDE: In this expert E-Guide from SearchEnterpriseWAN.com, explore the next generation of networks: Multiprotocol Label Switching (MPLS) networks.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

TOPICS: 
XO Communications

Simply Connecting Campus
sponsored by Juniper Networks, Inc.
PRESENTATION TRANSCRIPT: Mobile devices are taking over campus and branch networks. Do you know how to prepare for this influx?
Posted: 15 Feb 2012 | Published: 15 Feb 2012

TOPICS: 
Juniper Networks, Inc.

Changing the Conversation in the Workplace
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Uncover analysis of the findings in two surveys revealing workers’ attitudes about employee engagement, productivity, and communication technologies.
Posted: 09 Feb 2012 | Published: 09 Feb 2012

TOPICS: 
Alcatel-Lucent Enterprise
51 - 75 of 118 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement