Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

windows management

Results 1 - 25 of 135Sort Results By: Published Date | Title | Company Name
Published By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : 
acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery
    
Acronis Inc.
Published By: Acronis Inc.     Published Date: Jul 14, 2009
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.
Tags : 
acronis, backup, recovery, server, windows, disaster recovery, stand-alone, data protection
    
Acronis Inc.
Published By: Alacritech     Published Date: Aug 21, 2009
As IT costs grow, budgets shrink, and demand soars, there is an immediate need to extend and/or consolidate existing server assets. Many IT departments are currently faced with reduced capital budgets as well as decreased staffing levels for NAS Systems.
Tags : 
configuration, windows, change management, it spending, alacritech
    
Alacritech
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: AppSense     Published Date: Aug 21, 2009
Explore how AppSense Management Suite enables Microsoft Windows 2003 systems to deliver improved overall system security, simplified management and increased capacity and performance.
Tags : 
windows server, windows server 2003, network management, appsense, server optimization, platforms
    
AppSense
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing
    
AppSense
Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
    
AppSense
Published By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management, wireless
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry
Published By: BMC Software     Published Date: Jun 30, 2009
Deploying agent software on every system to run scheduled jobs is expensive, both to install and maintain. In this white paper, independent analyst firm Enterprise Management Associates highlights the cost-savings, flexibility, and agility of the agentless job scheduling technology built in to BMC CONTROL-M.
Tags : 
tco, total cost of ownership, bmc, product suite, wla, agentless, enterprise management associates, ema
    
BMC Software
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 07, 2014
Mobile workspaces fulfill the vision for anywhere, anytime flexibility and productivity. People are empowered to get their work done in an always-on, fully secure environment that follows them everywhere, on any device. With seamless access to all corporate resources—even on the same devices that hold their personal content—people can get their work done faster and better for optimal business impact. By achieving true enterprise mobility, the organization as a whole gains new levels of agility and performance. This paper discusses the elements to a complete mobile workspace solution.
Tags : 
business, growth, workspace, mobile, experience, launch, windows, desktop
    
Citrix Systems
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security, software development
    
Dell
Published By: Dell     Published Date: Oct 23, 2008
Windows Vista® offers a new way to deliver manageable IT services that are planned for security service-level agreements (SLAs), while helping to lower the cost of ownership, management, and deployment.
Tags : 
dell, service-level agreements, lower cost of vista deployment, application compatibility, client deployment solutions, image management, it management
    
Dell
Published By: Dell     Published Date: Sep 07, 2011
More government agencies are migrating to Windows 7 for highly optimized desktops and security. Find out how.
Tags : 
windows 7, government security, security, microsoft deployment, desktop, inventory applications, windows xp, government management
    
Dell
Published By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health
    
Dell
Published By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory
    
Dell
Published By: Dell     Published Date: Nov 09, 2012
Discover how Dell solutions can help you simplify and accelerate your Windows Server 2012 implementation, enabling you to enhance virtualization, IT management, cloud computing and worker productivity faster.
Tags : 
windows server 2012, dell solutions, it management, cloud computing, work productivity, data center
    
Dell
Published By: Dell     Published Date: Sep 12, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : 
microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
    
Dell
Published By: Dell     Published Date: Sep 12, 2013
With the arrival of Dell 12th generation servers (12G) and Microsoft Windows Server 2012, your organization can now significantly simplify Windows Server deployment. Window Server 2012 delivers a number of new enhancements and features over your current Windows Server 2003 or Windows Server 2008 infrastructure. With Windows Server 2012, your organization can benefit from improved virtualization, identity and access control management, graphical interface, storage and networking, and Web and application hosting. Dell 12G servers provide a powerful platform for Windows Server 2012 and its advanced features, giving your organization better performance, reliability and management, all of which improve return on investment (ROI) and your bottom line. For more information on powering Dell servers with Windows Server 2012, see www.dell.com/ws2012.
Tags : 
dell poweredge, 12g servers, windows servers, performance, reliability, control management, graphical interface, storage
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how the new Windows addresses today's workforce needs by enhancing mobile productivity, end-to-end security, and addresses virtualization and management advancements.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft
    
Dell
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.