Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

windows xp

Results 51 - 75 of 89Sort Results By: Published Date | Title | Company Name
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Microsoft has launched the most advanced Windows Server operating system yet: Windows Server 2008. Dell closely collaborated with Microsoft during development, gaining expertise in all aspects of its features and functionality, including key advancements in the management of remote infrastructures.
Tags : 
dell, windows server 2008, remote infrastructures, virtualization, dell powervault, platforms
    
Dell Windows Server
Published By: Dell     Published Date: Sep 07, 2011
More government agencies are migrating to Windows 7 for highly optimized desktops and security. Find out how.
Tags : 
windows 7, government security, security, microsoft deployment, desktop, inventory applications, windows xp, government management, government deployment, network management, remote network management
    
Dell
Published By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health
    
Dell
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Microsoft     Published Date: Jul 20, 2018
You’re running a lot of your business on Windows Server today— mission-critical apps, Active Directory, Domain Name Servers, not to mention virtual machines and storage. For more than 20 years, in fact, Windows Server has been the operating system of choice for enterprise workloads. This guide shows you how you can use your Windows Server expertise to give your organization a boost in the age of cloud computing, addressing these topics and others: • Why move to the cloud? • What are some ways to use Azure for Windows Server workloads? • What about security? • Who else is doing this? • How do I get started?
Tags : 
    
Microsoft
Published By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : 
avocent, landesk, windows 7, microsoft, windows, vista, support, sp2, sp3, support
    
LANDesk
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.
Tags : 
ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security, recruitment & staffing, outsourcing & subcontracting, outsourcing, outsource, labor relations, it operations, human resources, human capital management
    
IBM Software
Published By: CDW     Published Date: Dec 23, 2014
Learn the 5 steps for successfully deploying highly efficient infrastructure for Windows servers and see how you can lower operating expenses and reduce IT workload.
Tags : 
cdw, data, windows, server, infrastructure, technology, operations, compatibility, integration, security, speed, migration, servers
    
CDW
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal, ev ssl, ssl certificate, trust mark, encryption, online safety, online security, security solutions, verisign
    
VeriSign Incorp.
Published By: Lumension     Published Date: Jun 03, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : 
security, patch, data, regulatory compliance
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : 
security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development, it management
    
Lumension
Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365
Published By: Lenovo and Microsoft     Published Date: Jan 19, 2017
Getting students engaged in the classroom is always challenging. Keeping them engaged is often the more difficult battle! Windows 10 Pro paired with innovative Lenovo tablet, laptop, and desktop computers provides the perfect user experience-driven solution?—?where technology is never a constraint to innovation or engagement. Download this eBook and learn more.
Tags : 
lenovo, engaged learning, classroom technology
    
Lenovo and Microsoft
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: Cisco     Published Date: Jul 11, 2016
As Microsoft Windows Server 2003 nears its end-of-support date in July 2015, businesses still running the aging OS are facing a number of vital considerations. The computing landscape has changed drastically since the release of Windows Server 2003 more than a decade ago. Although the Windows Server 2003 platform worked well in its time, after Microsoft support expires, it will become both a liability and a limitation for organizations still running it. In this document, you’ll learn some of the important reasons why your company needs to migrate important workloads and services away from Windows Server 2003. You’ll learn about some of the biggest concerns about Windows Server 2003’s end of life, as well as some essential considerations to keep in mind while planning your migration.
Tags : 
    
Cisco
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: Citrix     Published Date: Dec 09, 2013
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery, mobile security, ip telephony, network security
    
Citrix
Start   Previous    1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.