Code42

Results: 44



#Item
31Cloud storage / Cloud infrastructure / Hybrid cloud / Data center / Computer security / IBM cloud computing / Kaavo / Cloud computing / Computing / Centralized computing

OV061304-Web_20140625.indd

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-05-07 16:53:10
32

CLIENT MANAGEMENT CHECKLIST Corporate adoption of tablets and smartphones poses new challenges for IT admins in the quest to offer enterprise management capabilities. New machine deployment, software updates, new softwar

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-25 08:16:04
    33Computer network security / Consumerization / Two-factor authentication / Password / Authentication / Network security / Malware / Threat / Security / Cyberwarfare / Computer security

    EntErprisE sEcurity chEcklist Don’t be a target! With the onset of BYOD and IT consumerization, threats to your network security and sensitive corporate information are very real. But there are simple steps you can sta

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-04-25 03:11:15
    34Enterprise mobility management / Bring your own device / Mobile enterprise / Consumerization / Mobile application management / Mobile business intelligence / Technology / Mobile device management / Mobile technology

    Enterprise Mobile Security Checklist It’s clear we have entered the era of the mobile enterprise. Users are driving the consumerization of IT by demanding to use their personal devices in the workplace, further propell

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-04-27 01:08:04
    35Technology / Embedded Linux / Mobile application development / Python / Software development / Enterprise mobility management / Android / Mobile apps / Google Chrome OS / Computing / Smartphones / Software

    Enterprise Mobility: A Checklist for Secure Containerization The mobilization of a workforce creates ongoing challenges for enterprise IT teams charged with security and compliance of critical corporate data on employee-

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-04-26 03:46:51
    36Consumerization / Backup / Computing / Security / Computer network security / BigFix / EXtensible Host Controller Interface / Computer security / Backup software / Data loss prevention software

    A BUYER’S CHECKLIST FOR ENDPOINT DATA PROTECTION: 10 KEY DIFFERENTIATORS Today, endpoint devices have expanded beyond desktops and laptops to include other mobile devices (e.g. tablets, smartphones, etc.), and these de

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-04-27 01:08:37
    37Bring your own device / Application software / Cloud computing / Electronic engineering / Mobile application management / Apperian / Technology / Mobile technology / Mobile device management

    A Checklist for BYOD in the Enterprise Ready or not, bring-your-own-device (BYOD) is here to stay. And enterprise IT must determine if it’s a valuable strategy for their organization, as well as the most effective appr

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-04-25 08:16:05
    38

    5 Impactful Tips for Securing BYOD in the Enterprise policies can pose security challenges to your enterprise environment. IT must monitor and control which these devices. Users must secure their devices in order to se

    Add to Reading List

    Source URL: essentials.code42.com

    - Date: 2015-04-25 08:16:05
      39Freedesktop.org / X Window System / Customer relationship management / Sales / Subscription business model / Computacenter / Business / Marketing / Software

      C RASH PLAN OVE RVIEW Summit Partner Program Enhance customer relationships and increase your bottom line with the

      Add to Reading List

      Source URL: essentials.code42.com

      Language: English - Date: 2015-04-25 21:46:06
      40

      7 MUST-HAVES FOR ACHIEVING MODERN ENDPOINT DATA PROTECTION FOR THE ENTERPRISE HERE ARE 5 MUST-HAVES FOR MODERN DATA PROTECTION FOR THE ENTERPRISE: Design for mobile.

      Add to Reading List

      Source URL: essentials.code42.com

      - Date: 2015-04-27 03:04:36
        UPDATE