RSS feed Get our RSS feed

News by Topic

windows 10

Results 51 - 75 of 123Sort Results By: Published Date | Title | Company Name
By: Microsoft Windows     Published Date: Mar 31, 2017
This Microsoft-commissioned report demonstrates how deploying Windows 10 can reduce costs and provide significant benefits to your organization. The report found an ROI of 233% with a payback period of only 14 months.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Worried about cybercriminals taking down your business? Outsmart them with Windows 10. The threat landscape has evolved dramatically in recent years. It seems every day we hear another headline about an organization getting breached. We've responded by changing the architecture of Windows 10 so that we’re not just building bigger walls against these attacks; we’re locking the criminals out. Windows 10 provides a comprehensive set of protections against modern security threats. Download this Infographic to learn more!
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 enabled key benefits across business and IT departments. Download this Infographic to learn more of Forrester's cornerstone findings.
Tags : 
     Microsoft Windows
By: Microsoft Windows Phone     Published Date: Feb 05, 2010
New mobile messaging features of Exchange 2010. Listen to this Searchmobilecomputing.com podcast that will discuss about the latest version of Windows Mobile.
Tags : microsoft, windows phone, mobile 6.5 operating system, mobile managing, exchange 2010, searchmobilecomputing.com
     Microsoft Windows Phone
By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
With faster adoption rates than any other upgrade, Windows® 10 is breaking records—and it’s poised to accelerate. In fact, Gartner predicts that 50% of businesses will be on their way to Windows 10 by early 2017—and 100% by 2019. Businesses of all sizes need an IT strategy that maintains employee productivity and business continuity without the worry of app compatibility issues or OS instability across differing end points. The time to upgrade to Windows 10 is now.
Tags : citrix, windows, windows 10, upgrade, productivity
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Windows 10 is poised to become the most rapid OS migration in history
Tags : vdi, citrix, os migration, windows 10
     Citrix Systems
By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : microsoft, security, best practices, data
     LogRhythm
By: McAfee EMEA     Published Date: Mar 14, 2018
The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research, has given McAfee Endpoint Security (ENS) a Top Product Award in their latest corporate Windows7 test. AV-Test evaluated the most recent version 10.5.3 of McAfee Endpoint Security and gave it a score of 17.5 out of a possible 18. Both Usability and Protection earned perfect scores of 6 out of 6, with Performance achieving a near-perfect score of 5.5 out of 6.
Tags : 
     McAfee EMEA
By: Lenovo and Intel®     Published Date: Oct 14, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : technology solutions, customer feedback, software, data security, encryption, cyberattacks
     Lenovo and Intel®
By: Lenovo and Intel®     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre
     Lenovo and Intel®
By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : reliability, uptime, performance, management, service-level agreement, sla, compliance, linux
     IBM
By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : avocent, landesk, windows 7, microsoft, windows, vista, support, sp2
     LANDesk
By: VMware AirWatch     Published Date: Sep 28, 2016
This is the Spanish version of this white paper.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Sep 28, 2016
This is the German version of this white paper.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Sep 28, 2016
This is the French version of this white paper.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Sep 28, 2016
This is the Italian version of this white paper.
Tags : 
     VMware AirWatch
By: VMware     Published Date: Dec 27, 2016
This is the Italian version of this white paper.
Tags : 
     VMware
By: VMware     Published Date: Dec 27, 2016
This is the French version of this white paper.
Tags : 
     VMware
By: VMware     Published Date: Dec 27, 2016
This is the German version of this white paper
Tags : 
     VMware
By: VMware     Published Date: Dec 27, 2016
This is the Spanish version of this white paper
Tags : 
     VMware
By: Fortinet     Published Date: Nov 11, 2013
This paper explores the limitations of Windows NLB and the benefits of deploying a hardware load balancing device to achieve optimum performance of MS Exchange 2010.
Tags : load balancing, exchange, exchange 2010, windows nlb, application delivery, ms exchange, application delivery controller, adc
     Fortinet
By: Fortinet     Published Date: Nov 11, 2013
This paper explores the limitations of Windows NLB and the benefits of deploying a hardware load balancing device to achieve optimum performance of MS Exchange 2013.
Tags : load balancing, exchange, exchange 2013, windows nlb, application delivery, ms exchange, application delivery controller, adc
     Fortinet
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics