RecruitingBlogscom

Follow Us:

 

abs

Results 26 - 50 of 492Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : 
absolute, technical support, healthcare organizations, operating environment
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : 
absolute, power saving policy, management, roi, energy savings, policy metrics, network management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : 
absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : 
security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr, asset security strategy, patients, employees, best practices, reportable incidents
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : 
la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources, resource allocation, configuration, software, hardware, requirements
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : 
auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 10, 2012
The story of val Verde will help schools innovate better, streamline purchasing, increase cost-efficiencies, and ultimately, provide staff and students with a fleet of optimally running devices.
Tags : 
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Committed to providing a first class education for the "whole child", Bensalem Township School District's technology team has innovated the learning experience with "technology infused instruction". Read this case study to find out how!
Tags : 
bensalem, power management, innovation, interactive, engaging, education
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Chicago Public Schools (CPS) pursues a leading approach to integrating technology into the learning experience and provides students with access to computers throughout their education..
Tags : 
education, absolute, cps, chicago, integration
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Kansas City, Kansas Public Schools looked to establish a 1:1 computing program that would provide 6,000 Apple computers to its students and teachers. Find out more in this case study!
Tags : 
kansas, kansas city, education, public schools, computrace, 1:1, education, absolute
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Dysart Unified School District (DUSD) is Arizona's fastest-growing school district. Despite the district's extremely rapid expansion, it remains focused on its mission of "Increasing in Excellence" - or, preparing students for life in the new century.
Tags : 
laptop learning, dysart, dusd, arizona, students
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
This IDC document presents highlights from the Adopting Mobility in the Enterprise Executive Roundtable held in New York City.
Tags : 
security, mobile, cloud, tablet, consumerization, business technology
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : 
byod, network security, mobile, security, policy, apple, end user, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
In the last four years, the number of Mac computers at Under Armour has quadrupled.
Tags : 
apple, asset management, end users, security
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user, security
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 02, 2013
The growing use of tablets, smartphones, and ultrabooks makes enpoint governance, risk management, and compliance (GRC) more challenging.
Tags : 
absolute software, grc strategy, adjust your endpoint, enpoint governance, security
    
Absolute Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top