desktop security

Results 26 - 50 of 101Sort Results By: Published Date | Title | Company Name
By: IBM Cloud Business     Published Date: Jul 12, 2011
IT Managers: Reduce costs with enterprise ready environments. Take advantage of easy and flexible onboarding for business-ready virtual servers. Rapidly improve project set up and shorten development times. Find out how.
Tags : cloud computing, desktop virtualization, hardware, ibm corp., security
     IBM Cloud Business
By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking
     Prodiance Corp.
By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware AirWatch
By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : hospital, cyber, security, data
     BlackBerry Cylance
By: Citrix Online HiDef     Published Date: Aug 01, 2011
This new case study explores how HiDef CorporateT from Citrix Online Audio enables the American Cancer Society to cut audio conferencing costs by nearly 50% - savings that bolster the organization's core mission.
Tags : hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop
     Citrix Online HiDef
By: Citrix Online HiDef     Published Date: Aug 01, 2011
This new Frost & Sullivan executive brief explores today's trends in audio conferencing, the impact of a diverse user base and how pricing models are evolving to match use.
Tags : hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop
     Citrix Online HiDef
By: HP Inc.     Published Date: Feb 03, 2016
Almost every organization takes its desktop/laptop security seriously – but most simply rely on software-level solutions, missing out on a deeper level of protection. Are these traditional software solutions keeping data safe enough? Not according to a recent Spiceworks survey, in which only about half of IT professionals in the Americas feel like their current, software-level solutions are very effective. Where does your organization rank?
Tags : 
     HP Inc.
By: GoToWebinar     Published Date: Aug 02, 2011
This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
A recent MarketingSherpa Webinar on the topic of high-conversion content uncovered five burning questions from participants about specific types of content. This brief explores these questions and offers advice and strategies for content creation and distribution.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
     GoToWebinar
By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
     Dell EMC
By: ScriptLogic     Published Date: Jan 11, 2012
Discover how the software helps achieve compliance with HIPAA standards, by giving IT administrators the power and control they need.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: F5 Networks Inc     Published Date: Apr 17, 2012
Learn how to unburden your VDI infrastructure and gain added security, network performance improvements and optimizations, while improving the architecture for non-VDI application specific systems.
Tags : virtual desktop, virtual desktop infrastructure, vdi, vdi impact on the network, vdi performance, vdi security, vdi management, vmware view
     F5 Networks Inc
By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to have a fluid help desk to work flow and how to resolve quickly and correctly, users IT issues. Read on.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: IBM     Published Date: Jul 09, 2014
To gain fast access to patient records, Kochi Medical School Hospital in Japan struggled to use aging mobile devices that were unreliable and expensive to repair. Read the case study to learn how the hospital used IBM Mobility Services and desktop cloud to deploy hundreds of mobile devices at a lower per-device cost in a security-rich cloud environment. IBM helped the hospital achieve anywhere, anytime access to patient records; maintain the confidentiality of patient medical information; improve patient care coordination; and increase staff productivity.
Tags : ibm, mobile computing, mobile computing system, cloud services, productivity, technology services, cloud platform, mobility
     IBM
By: Citrix Systems     Published Date: Feb 23, 2011
Citrix solution brief explains the technical functionality of Citrix solutions that enable a successful BYO program.
Tags : citrix systems australia, byo program, employee productivity, windows desktop, bring your own computer, employee productivity, data security, mobile computing
     Citrix Systems
By: Citrix Online HiDef     Published Date: Aug 01, 2011
This Forrester white paper examines three surprising findings from a recent study of working behaviors that impact how businesses communicate and collaborate with an increasingly distributed workforce.
Tags : hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop
     Citrix Online HiDef
By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
     GoToMeeting
By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to manage permissions across hundreds of servers. Learn more and read on.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : entrust, security, mobile security, infographic, malware, mobile devices
     Entrust Datacard
By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
     MobileIron
By: VMware     Published Date: Feb 24, 2017
IT organizations are largely siloed between the desktop and mobile management worlds. IT has addressed management of mobile devices with modern enterprise mobility management (EMM) solutions. However, Windows desktops have been managed separately using older PC lifecycle management (PCLM) technologies, which have fallen short of basic IT and end user expectations of today’s evolved, mobile-cloud workforce. The VMware AirWatch® Unified Endpoint Management (UEM) solution is a single, platform-independent approach for managing every device and every operating system across any organizational use case. The solution combines traditional client management requirements with modern EMM efficiencies enabling IT to deliver OS policies, patches, and apps over-the-air. Cloud-first management with instant push technologies and self-service capabilities ensure lower cost management, better security, and peak user experience regardless of the device being used to access the corporate environment.
Tags : 
     VMware
By: AppSense     Published Date: Nov 26, 2012
This case study demonstrates how AppSense Application Manager is transparent to end-users, unobtrusive for administrators, and requires extremely little administration.
Tags : user experience, end-point users, appsense, application management, application manager, desktop security, end user experience
     AppSense
By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
     Good Technology Corporation
By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : upgrade, principled technologies, mobility, windows 10
     Dell
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com