Citrix today announced XenMobile, the rebranded and integrated mobile device management (MDM) software the company acquired through its acquisition of Zenprise last year. "What we've been doing ... is integrating Zenprise pieces with the ...
Tags: Citrix, Apple iOS, Android devices
Citrix on Wednesdy announced XenMobile, a rebranded and integrated mobile device management (MDM) software, which the company acquired through its acquisition of Zenprise last year. “What we’ve been doing is integrating ...
Tags: Citrix, MDM Tool, Android, iOS Devices
4t Networks recommends that business owners in South Carolina prepare for hurricane season by implementing a disaster recovery plan. For organizations unprepared with a backup and disaster recovery plan, a hurricane can destroy your ...
Tags: 4t Networks, disaster recovery, data, computing
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
MicroStrategy is adding an Express option for potential users of its cloud-based BI (business intelligence) service, the company announced Tuesday. The Express edition, now in beta, is a move up from MicroStrategy Cloud's Personal ...
Tags: MicroStrategy, Express option, cloud based BI, Express
BT has revealed it is making its One Voice app globally available, encouraging users to make calls on their smartphones via their corporate virtual private network (VPN). Initially launched in the Asia-Pacific region, the app runs on ...
Tags: BT, smartphones, BlackBerry, Apple
IDG News Service - IBM has teamed with AT&T to offer secure shared cloud services to customers over private networks rather than the public Internet, the companies said Tuesday. The service to be delivered from early next year is targeted ...
Tags: IBM, networks, public Internet, computing resources
4t Networks encourages Texas companies to prepare themselves for hurricane season with a disaster recovery and backup plan. 4t Networks' disaster recovery plan transfers your VMware virtual machines, over a virtual private network, to the ...
Tags: 4t Networks, disaster recovery, hurricane season, virtual private network
PRIVATE WiFi, an innovative company in the security software market, now offers site seals so that websites can let their users know that they are concerned with data privacy and online security. PRIVATE WiFi's site seals add a badge of ...
Tags: PRIVATE WiFi, security software market, data privacy, online security
IBM has struck up a partnership with AT&T to offer secure shared cloud services to customers over private networks rather than the public Internet, the companies announced. The service to be delivered from early next year is targeted at ...
Tags: cloud, cloud computing, cloud services, collaboration, IBM
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
Check Point Software Technologies plans to introduce document security software that encrypts and controls access to files across an organization's various departments and also meets the growing need for corporate users to access company ...
Bruce Chantry, Equipment Portfolio Manager, The Lincoln Electric Company In a competitive global economy, efficiency reigns supreme on the shop floor, especially when it comes to overall equipment effectiveness. With this in mind, ...
Tags: Lincoln Electric, welding product, monitoring tools, welding power source
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in government systems. The initiative has come too late to stop the first big contract wins delivered under the ...
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft,data theft,snooping,impersonation and malware infection.That's why so many people rely on public virtual private network services,but VPNs are no ...
Tags: Computer, VPN, public Wi-Fi hotspot, security