LISA Reports

Enterprise mobility management: Choosing the right approach and considering costs
sponsored by TechTarget Security
EGUIDE: Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

TechTarget Security

Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer
sponsored by Intel
ANALYST REPORT: For every 100 laptop PCs companies issue, 15 will never be seen again, according to this research report sponsored partly by Intel. Five will be lost or stolen (one recovered) and 11 will simply vanish, leaving companies stuck for millions of dollars in compromised data alone.
Posted: 27 Apr 2010 | Published: 01 Feb 2010

Intel

Evaluating Thin-Client Security in a Changing Threat Landscape
sponsored by Intel
WHITE PAPER: Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper.
Posted: 28 Apr 2010 | Published: 01 Apr 2010

Intel

VMware ACE 2
sponsored by VMware, Inc.
PRODUCT DEMO: Complex desktop environments have proven difficult for deployments, maintenance, and control. Download this free trial from VMware which combines the power and versatility of virtual machines with the security and control of centrally managed PCs
Posted: 31 Oct 2007 | Premiered: 31 Oct 2007

VMware, Inc.

The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs
sponsored by Intel
WHITE PAPER: The all new Intel® Core™ vPro™ processor family complements the new Windows® 7 operating system by building effective trusted computing and management mechanisms into the hardware. Read this paper to learn more.
Posted: 04 Oct 2010 | Published: 25 Jan 2010

Intel

Considering a BYOPC Strategy
sponsored by TechTarget Security
EGUIDE: Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

Intel vPro Technology Launch Video
sponsored by Intel Corporation
WEBCAST: Business Desktop PCs with Intel vPro technology provide down-the-wire proactive security and manageability capabilities for your every business needs'-even when the user's environment is inoperable.
Posted: 02 Oct 2006 | Premiered: Oct 2, 2006

Intel Corporation

BYOPC Strategy: Policies and Problem Solving
sponsored by TechTarget Security
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget Security

Dell™ Powervault™ DL2000 Powered by Symantec® Backup Exec™
sponsored by DellEMC and Intel®
DATA SHEET: The PowerVault DL2000 - Powered by Symantec Backup Exec is the first of Dell's TierDisk family of products, designed to provide cost-optimized solutions for secondary storage environments for data protection and data management.
Posted: 26 Jan 2009 | Published: 26 Jan 2009

DellEMC and Intel®