Home
 > search for

Featured Documents related to »  secure desktop


Best Practices for Secure Desktop-based Information Search in the Enterprise
Knowledge workers by the millions are leveraging desktop search (DTS) tools. However, with change comes risk, and failing to proactively establish policies and

secure desktop  Practices for Secure Desktop-based Information Search in the Enterprise Knowledge workers by the millions are leveraging desktop search (DTS) tools. However, with change comes risk, and failing to proactively establish policies and lock down a centrally managed DTS solution can result in significant civil and criminal liabilities. But by following a few basic principles, companies can realize the full benefits of this new technology, while enhancing their information security. Read More...
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » secure desktop


Packard Bell / NEC Leads Secure Etoken Deployment
On October 19, Aladdin Knowledge Systems ( Nasdaq: ALDN ), a global leader in the field of Internet content and software security, announced with Packard Bell

secure desktop  Bell / NEC Leads Secure Etoken Deployment Event Summary On October 19, Aladdin Knowledge Systems ( Nasdaq: ALDN ), a global leader in the field of Internet content and software security, announced with Packard Bell NEC International ( Nasdaq: NIPNY ), the leading brand of consumer PCs in Europe, an agreement to bundle approximately 50,000 eTokens on Packard Bell PCs. The eTokens, or Internet keys, will come in different colors so that all family members can have a unique color code. Retail shops in Read More...
Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

secure desktop  provides you with a secure electronic desktop workstation. Files and indeed entire folders (directories) can be secured for your personal use, or configured in such a way that they are available for the shared, exclusive use of a selected group. With transparent encryption and advanced management, Secure Folder enables outstanding ease of use and the highest degree of security for sensitive data. Secure Folder uses an acknowledged secure asymmetrical encryption method and secure symmetrical encryption Read More...
Are Your Company Laptops Truly Secure?
The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and

secure desktop  the actions taken to secure computers remain deployed and intact until the computer can be located. COMPLIANCE. PROTECTION. RECOVERY. A LAYERED APPROACH TO CORPORATE SECURITY THE POWER OF MOBILITY The power of mobility afforded by laptop computers has meant that tremendous flexibility and productivity has become the standard of business for most information workers. Mobility means being able to perform professional corporate presentations while visiting clients; update a budget while traveling on Read More...
Oracle Enhances Its Virtual Desktop Client Solutions for Mobile Devices
With the release of Oracle Virtual Desktop Client 1.2 for Tablets, Oracle will be making available a new set of features to provide support for Android, in

secure desktop  provide mobile workers with secure access to their applications and data. While technologies for accessing data and applications have evolved dramatically, we might still be a few steps away from achieving true “device transparency” for accessing data and applications. Read More...
Secure Your Search Engine
Webservers running the search engines are vulnerable to a serious security compromises. Without careful implementation, user passwords and logins can be stolen,

secure desktop  have a much more secure internet if all vendors responded to security holes as fast as Zeus. Read More...
Microsoft Dynamics GP: Planning for Security
Keeping up-to-date on security features is challenging for any size business. Making your computer system secure without sacrificing usability isn’t easy. In

secure desktop  Making your computer system secure without sacrificing usability isn’t easy. In fact, careful planning is absolutely necessary to ensure a secure system that works for you. Whether you’re worried about hackers, phishing, or internal breaches, there is a security solution to help you protect your critical data. Read More...
Desktop Video Conferencing: Industry Trends and Deployment Best Practices
The economic downturn and the consequent need to save money have raised the already increasing demand for visual communication and collaboration solutions aimed

secure desktop  Video Conferencing: Industry Trends and Deployment Best Practices The economic downturn and the consequent need to save money have raised the already increasing demand for visual communication and collaboration solutions aimed at escalating productivity while reducing expenses. This white paper analyzes trends in desktop video conferencing, highlighting the best practices for its deployment in the enterprise, and its adaptability to environments such as education and telehealth. Read More...
Go from Analysis to Action on Your Desktop
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. This paper explores

secure desktop  from Analysis to Action on Your Desktop Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. This paper explores how a breakthrough personal analytics tool enables business managers to improve performance within their functional areas. Read More...
IBM PC Line Redrawn
IBM has decided to combine its entire desktop PC line under one name. The NetVista brand, until last week the name for IBM’s thin clients and appliance desktops

secure desktop  PC Line Redrawn IBM PC Line Redrawn R. Krause - September 27, 2000 Event Summary 9/14/2000 [Source: IBM] IBM has added new models to its NetVista PC family, completing the desktop PC model transition begun earlier this year. The activity continues IBM's Edge of Network initiative, with devices designed from the ground up for fast, high-bandwidth Internet access, easy set-up and simplified use. Additions include: New Netvista desktop systems New data recovery/data transfer software IBM Direct Build Read More...
Licking Desktop Problems
Like the old tootsie pop ads that ask how many licks it takes to get to the center, how many annoyances does it take to get people and businesses to change

secure desktop  Desktop Problems Like the old tootsie pop ads that ask how many licks it takes to get to the center, how many annoyances does it take to get people and businesses to change desktop operating systems? Aside from the frequent crunch of bloggers discussing their switch from Windows to Linux, we're still waiting to find out. In the news this week, Microsoft annoyed a number of admins with its Windows Desktop Services update. This added to many peoples' perception that Microsoft pushes some of its Read More...
Extending Document Life Cycle Management to the Desktop
Given ever-increasing regulatory pressures, document life cycle management is clearly an issue every enterprise must resolve. Until now, documents stored on

secure desktop  Document Life Cycle Management to the Desktop Given ever-increasing regulatory pressures, document life cycle management is clearly an issue every enterprise must resolve. Until now, documents stored on local machines and e-mailed outside the organization have presented a particularly thorny challenge. Fortunately, new technologies make it possible to extend document life cycle management to the desktop and enforce document retention policies across every computer in the enterprise. Read More...
Fiberlink
Fiberlink is the recognized leader in software-as-a-service (SaaS) solutions for secure enterprise mobile device, application and document management. Its cloud

secure desktop  software-as-a-service (SaaS) solutions for secure enterprise mobile device, application and document management. Its cloud-based MaaS360 platform provides IT organizations with mobility intelligence and control over mobile devices, applications and content to enhance the mobile user experience and keep corporate data secure across smartphones, tablets, and laptops. MaaS360 helps companies monitor the expanding suite of mobile operating systems, including Apple iOS, Android, BlackBerry, and Windows Phone. Read More...
Abandon All Insecurity, Ye Who Enter Here
Commerce One will add Netegrity’s secure portal management solution to its offerings. This will add a wide range of access control mechanisms, personalization

secure desktop  specializes in solutions for secure management of websites. Their flagship product, SiteMinder, is a highly scalable access control system that provides single login over multiple domains and supports a variety of access control mechanisms down to the sub-page level. Commerce One (NASDAQ: CMRC) will bundle SiteMinder into its Commerce One MarketSite Portal Solution, its product that is used by market makers to build and administer digital marketplaces. Market Impact Providing the infrastructure for its Read More...
Managing Small Data Centers: A Short Guide to Running Secure and Resilient Data Centers for Mid-sized Businesses
To keep your growing business competitive, your data center must be secure, protected against disaster, and available 24 hours a day, 7 days a week. But if

secure desktop  Short Guide to Running Secure and Resilient Data Centers for Mid-sized Businesses To keep your growing business competitive, your data center must be secure, protected against disaster, and available 24 hours a day, 7 days a week. But if managing IT is not your core competence, what are your options? A managed service provider (MSP) can help. Learn about the benefits of outsourcing data center management, and make sure your crucial business applications are always available when you need them. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others