desktop security

Results 51 - 75 of 101Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : entrust, security, mobile security, infographic, malware, mobile devices
     Entrust Datacard
By: IBM     Published Date: Jan 09, 2014
IBM’s SmartCloud VDI solution leverages the IBM PureFlex and Flex System portfolio, Cloud and Smarter Infrastructure products and the company’s design/deploy services to deliver reliable, powerful and secure managed desktop infrastructures.
Tags : smartcloud vdi, ibm smartcloud, vdi solution, v7000 storage, desktop infrastructures, virtual desktop, storwize v7000, vmware view, pureflex system, platform infrastructure, system security, ibm pureflex, storage, data management
     IBM
By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter, networking, it management, enterprise applications, storage, data management, data center
     VMware, Inc
By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device, vdi, networking, security, it management, enterprise applications, storage, data management, data center
     VMware, Inc
By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
     Citrix
By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
     Good Technology Corporation
By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci
     McAfee
By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
     AppSense
By: AppSense     Published Date: Nov 26, 2012
This case study demonstrates how AppSense Application Manager is transparent to end-users, unobtrusive for administrators, and requires extremely little administration.
Tags : user experience, end-point users, appsense, application management, application manager, desktop security, end user experience
     AppSense
By: Citrix     Published Date: Nov 09, 2012
The tension between security and business productivity has never been so acute. To operate at peak performance, firms need workers to access resources in more ways and places than before -- Read for the man reasons to strengthen IT security in cloud.
Tags : citrix, it infrastructure, desktop, virtualization, cloud, security, data management, data center
     Citrix
By: Ericom     Published Date: Nov 05, 2012
The accelerating BYOD trend and the need to reduce IT overhead, organizations need to empower users with secure browser-based access to Windows Applications and desktops from any device. Learn how AccessNow empowers mobility and security.
Tags : ericom, html5, rdp, accessnowt, windows apps, desktops, mobility
     Ericom
By: HP & Intel     Published Date: Sep 18, 2012
Many organizations are considering Virtual Desktop Infrastructure (VDI), which centralizes the execution of users' desktops in the data center, to address growing data loss and endpoint security concerns.
Tags : data protection, desktop virtualization, idv, intelligent desktop virtualization, vdi, virtual desktop infrastructure, backup and recovery, security, data management
     HP & Intel
By: Intel     Published Date: Aug 10, 2012
Intelligent Desktop Virtualization (IDV) combines the best end point security with no compromises in user experience, productivity, cost, or flexibility.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
     Intel
By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, data center
     Dell Software
By: F5 Networks Inc     Published Date: Apr 18, 2012
VDI deployments offer tremendous advantages but can also impact server and network resources significantly.  A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.
Tags : vdi, vmware view, citrix, xenapp, xen desktop, virtual desktop infrastructure, big-ip, application delivery controllers, adc, vdi performance, vdi scalability, vdi security, microsoft vdi
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Apr 17, 2012
Learn how to unburden your VDI infrastructure and gain added security, network performance improvements and optimizations, while improving the architecture for non-VDI application specific systems.
Tags : virtual desktop, virtual desktop infrastructure, vdi, vdi impact on the network, vdi performance, vdi security, vdi management, vmware view, citrix, microsoft vdi
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Apr 17, 2012
Overcome Citrix VDI implementations challenges to deliver the highest end-user quality, most secure access to virtual desktop, while simplifying your IT infrastructure. Learn how global companies maximize their Citrix investment to increase availability, security, and performance.
Tags : citrix, xenapp, xen desktop, vdi, virtual desktop, application virtualization, desktop virtualization, vdi performance, vdi security, vdi management
     F5 Networks Inc
By: PC Mall     Published Date: Mar 27, 2012
This eGuide highlights how to harness the benefits of Virtual Desktop Infrastructure using a robust data center that is optimized for virtualization.
Tags : virtual, virtualization, infrastructure, foundation, backbone, data center, desktop infrastructure, cisco, eguide, vdi, applications, data, servers, data security, total cost of ownership, optimization, it management
     PC Mall
By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
     Dell Storage
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com