Laptops Reports

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by TechTarget Security
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

TechTarget Security

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

Computer Weekly – 1 July 2014: Supporting Apple in the enterprise
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide takes an in-depth look at how to support Apple products in an enterprise IT infrastructure. We find out how eBay built its own Openstack private cloud. And the chief of the government's G-Cloud programme talks about changing public sector IT procurement. Read the issue now.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

TechTarget ComputerWeekly.com

3 Cloud Backup Services Ease Protection of Laptops
sponsored by Code42
EGUIDE: This e-guide examines three types of cloud backup services and the key factors you need to consider when evaluating them.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

Code42

Lenovo ThinkPad T Series Packs Power. Not Pounds
sponsored by Insight and Lenovo
DATA SHEET: Check out this infographic to view a family of portable computers that are truly built for performance. Designed to help you make the most of today's increasingly-mobile business landscape, these lightweight and high-powered solutions have it all.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Insight and Lenovo

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

TechTarget Security

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Citrix XenClient Virtual desktops… to go
sponsored by Citrix Systems, Inc.
PRODUCT OVERVIEW: This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Citrix Systems, Inc.