AT Computers Reports

Evaluating Thin-Client Security in a Changing Threat Landscape
sponsored by Intel
WHITE PAPER: Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper.
Posted: 28 Apr 2010 | Published: 01 Apr 2010

Intel

BYOPC Strategy: Policies and Problem Solving
sponsored by TechTarget Security
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget Security

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

TechTarget Security

Getting Ahead of Malware
sponsored by Intel
WHITE PAPER: To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.
Posted: 28 Apr 2010 | Published: 01 Dec 2009

Intel

IT Handbook: Windows 8 Migration Station
sponsored by DELL TECHNOLOGIES AND MICROSOFT
EBOOK: This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

DELL TECHNOLOGIES AND MICROSOFT

The Consumerization of IT 101
sponsored by TechTarget Security
EGUIDE: Access this expert briefing to get answers to your most pressing questions concerning the consumerization of IT.
Posted: 15 Feb 2012 | Published: 14 Feb 2012

TechTarget Security

Enterprise mobility management: Choosing the right approach and considering costs
sponsored by TechTarget Security
EGUIDE: Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

TechTarget Security

Considering a BYOPC Strategy
sponsored by TechTarget Security
EGUIDE: Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Dell™ Powervault™ DL2000 Powered by Symantec® Backup Exec™
sponsored by DellEMC and Intel®
DATA SHEET: The PowerVault DL2000 - Powered by Symantec Backup Exec is the first of Dell's TierDisk family of products, designed to provide cost-optimized solutions for secondary storage environments for data protection and data management.
Posted: 26 Jan 2009 | Published: 26 Jan 2009

DellEMC and Intel®

IT Handbook: Windows 8 Migration Station
sponsored by Dell, Inc. and Intel®
EBOOK: This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing.
Posted: 29 Nov 2012 | Published: 25 Oct 2012

Dell, Inc. and Intel®