HIT Consultant Insightful coverage of healthcare innovation
 

remote

Results 576 - 600 of 749Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Dell EMC     Published Date: Jun 29, 2016
The EMC IsilonSD product family combines the power of Isilon scale-out NAS with the economy of software-defined storage. IsilonSD Edge is purpose built to address the needs associated with growing unstructured data in enterprise edge location including remote and branch offices. Read the solution brief to find out more about the power of software-defined storage combined with EMC Isilon.
Tags : 
storage, data, best practices, enterprise
    
Dell EMC
Published By: Riverbed     Published Date: Sep 17, 2013
Learn how Riverbed® OPNET Unified Communications Xpert™ (UC Xpert) software provides end-to-end service management for Unified Communications and remote troubleshooting.
Tags : 
riverbed, service management, ip communications, ip networks, ip telephony, web conferencing, ip faxing, wireless office, network performance
    
Riverbed
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud.
Tags : 
software-based networking, cloud data, sd-wan
    
VMware SD-WAN by VeloCloud
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail
    
Aventail
Published By: Riverbed     Published Date: May 29, 2015
As the number of branch and remote locations increases, companies find themselves deploying more and more infrastructure
Tags : 
infrastructure. data center, performance, cloud
    
Riverbed
Published By: Server Technology     Published Date: Feb 10, 2015
WebEx elected to pursue a course of investigation and analysis that required a granular picture of its application-centric hardware implementations and corresponding power usage profiles. To accomplish this, WebEx decided to retool their datacenters with intelligent power strips having the ability to remotely report power consumption.
Tags : 
server technology, power consumption, power and cooling, energy costs, roi
    
Server Technology
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Clarus Systems     Published Date: Mar 18, 2008
The recent momentum of Unified Communications (UC) and the disruptive enabling technology of IP Telephony have created a convergence between Voice Engineering and IT departments that is unprecedented - even since the advent of computer telephony integration. However, despite rapid and significant advances within these technologies, many enterprises, even the early adopters, have not fully embraced the alignment of these two worlds.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: HP     Published Date: Jul 21, 2011
HP's Converged Infrastructure incorporates tools that make remote support and management efficient and effective. HP Insight Control, for example, helps reduce server deployment time from four hours to just 20 minutes, a 12-fold decrease in deployment time.
Tags : 
idg, strategy guide, converged infrastructure, hewlett-packard, branch office, unified communications, convergence, idc
    
HP
Published By: Sponsored by HP and Intel     Published Date: Jul 21, 2011
HP's Converged Infrastructure incorporates tools that make remote support and management efficient and effective. HP Insight Control, for example, helps reduce server deployment time from four hours to just 20 minutes, a 12-fold decrease in deployment time.
Tags : 
idg, strategy guide, converged infrastructure, hewlett-packard, branch office, unified communications, convergence, idc
    
Sponsored by HP and Intel
Published By: HP     Published Date: Nov 05, 2014
Remove the unnecessary burdens of server management and provisioning with HP Integrated Lights-Out (iLO), designed to support the full lifecycle of servers from initial deployment to ongoing management and service alerting.
Tags : 
server management, streamlined, it life cycle, business intelligence, remote support, licensing options, servers, bladesystem, server administration
    
HP
Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection, ibm solutions
    
IBM
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Department for International Trade     Published Date: Mar 20, 2018
This Whitepapaer looks into three success stories: Bringing McLaren’s advanced manufacturing back to the UK Diagnosing and resolving shipping issues remotely Building Europe’s biggest aerospace castings facility
Tags : 
    
Department for International Trade
Published By: Bomgar     Published Date: Feb 28, 2008
Support virtualization enables your support reps to be at multiple locations at once, solving support issues with unbelievable speed and effectiveness.  Over 3,500+ organizations have virtualized their support reps and have decreased IT costs while increasing support rep productivity.
Tags : 
virtual support, customer service, customer support, remote support, remote workers, bomgar
    
Bomgar
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, author Brian Zubert tells about, Java Specification Request (JSR) that means, proposed addition to the Java platform, proposed and reviewed by expert group, public review before JSR finalized, Must be approved by Java Community Process (JCP) Executive Committee.
Tags : 
blackberry, java, jsr, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture, jumpnode, jumpnode systems
    
Jumpnode Systems
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.