Home
 > search for

Featured Documents related to » faronics



ad
Get Free ERP Systems Comparisons Now

Find the best ERP software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » faronics


Case Study: Faronics Insight and Bangor Township Schools
The teachers at Bangor Township Schools in Michigan (US) wanted a way to monitor students’ computer screens to make sure computers were being used for classroom projects and not games or messaging. Insight, Faronics’ classroom management solution, allows teachers to monitor every screen and to send warnings to students who visit inappropriate web sites. Read about the other benefits these teachers gained with Insight.

FARONICS: Case Study: Faronics Insight and Bangor Township Schools Case Study: Faronics Insight and Bangor Township Schools Source: Faronics Document Type: Case Study Description: The teachers at Bangor Township Schools in Michigan (US) wanted a way to monitor students’ computer screens to make sure computers were being used for classroom projects and not games or messaging. Insight, Faronics’ classroom management solution, allows teachers to monitor every screen and to send warnings to students who visit
12/6/2007 4:46:00 PM

Case Study: University of Kentucky
Student workstations at the University of Kentucky were constantly going down due to user activity—both innocent and malicious. IT couldn’t repair all the workstations immediately, so many students had to wait to use a computer. To reduce computer downtime and eliminate workstation damage, the system administrator installed a solution that prevented workstation drift and helped ensure desktop security. Find out how.

FARONICS: University of Kentucky Source: Faronics Document Type: Case Study Description: Student workstations at the University of Kentucky were constantly going down due to user activity—both innocent and malicious. IT couldn’t repair all the workstations immediately, so many students had to wait to use a computer. To reduce computer downtime and eliminate workstation damage, the system administrator installed a solution that prevented workstation drift and helped ensure desktop security. Find out how. Case
5/1/2009 1:26:00 PM

Faronics Anti-executable Compared to Limited (Restrictive) Users and Group Policies
Many organizations use limited (restricted) users and system policies and group policies to ensure users cannot access certain areas of the computer or install most off-the-shelf software. However, these approaches require the network administrator to be very knowledgeable, and to spend large amounts of time setting and maintaining the policies. The alternative: a whitelist-based security solution.

FARONICS: Faronics Anti-executable Compared to Limited (Restrictive) Users and Group Policies Faronics Anti-executable Compared to Limited (Restrictive) Users and Group Policies Source: Faronics Document Type: White Paper Description: Many organizations use limited (restricted) users and system policies and group policies to ensure users cannot access certain areas of the computer or install most off-the-shelf software. However, these approaches require the network administrator to be very knowledgeable, and to
4/9/2007 7:07:00 PM

Case Study: Faronics Deep Freeze and Mobile County Public School System
The Mobile County Public School System was frustrated with frequent attacks by viruses and malware on its student and staff workstations. The school district’s IT department searched for ways to gain more control over the multi-user computer environment. With Faronics’ Deep Freeze servers, IT now has centralized control of workstations, and increased protection against the effects of spyware, malware, and viruses.

FARONICS: Case Study: Faronics Deep Freeze and Mobile County Public School System Case Study: Faronics Deep Freeze and Mobile County Public School System Source: Faronics Document Type: Case Study Description: The Mobile County Public School System was frustrated with frequent attacks by viruses and malware on its student and staff workstations. The school district’s IT department searched for ways to gain more control over the multi-user computer environment. With Faronics’ Deep Freeze servers, IT now has
10/3/2007 2:05:00 PM

Case Study: Coeur D’Alene
Coeur D’Alene School District’s director of maintenance was looking for ways to help the district save money. Knowing that the district was spending a lot on energy and that an element of energy waste was involved, he decided to search for an energy management solution for the district’s classroom computers. Find out more about the software-based desktop computer energy management solution the district implemented.

FARONICS: Study: Coeur D’Alene Source: Faronics Document Type: Case Study Description: Coeur D’Alene School District’s director of maintenance was looking for ways to help the district save money. Knowing that the district was spending a lot on energy and that an element of energy waste was involved, he decided to search for an energy management solution for the district’s classroom computers. Find out more about the software-based desktop computer energy management solution the district implemented. Case
4/30/2009 3:21:00 PM

Blacklist versus Whitelist Software Solutions
The problems caused by malware and malicious code in the form of rootkits and Trojans are multiplying everyday. These pervasive problems have created a new industry of antivirus and anti-spyware software. Blacklist-based software is one of the most common response solutions. However, the relatively new approach of whitelist-based software is a simple and secure option for total system control.

FARONICS: Whitelist Software Solutions Source: Faronics Document Type: White Paper Description: The problems caused by malware and malicious code in the form of rootkits and Trojans are multiplying everyday. These pervasive problems have created a new industry of antivirus and anti-spyware software. Blacklist-based software is one of the most common response solutions. However, the relatively new approach of whitelist-based software is a simple and secure option for total system control. Blacklist versus Whitelist
4/9/2007 7:04:00 PM

Case Study: Lewis and Clark Community College
Lewis and Clark Community College in Illinois (US) was having a number of technology problems in its classrooms, leading to student attention issues. After installing a new software solution, teachers can now share their screens with students, provide remote assistance to students from a central console, and monitor classroom screens to ensure students are on task. Find out more about this workstation management solution.

FARONICS: Clark Community College Source: Faronics Document Type: Case Study Description: Lewis and Clark Community College in Illinois (US) was having a number of technology problems in its classrooms, leading to student attention issues. After installing a new software solution, teachers can now share their screens with students, provide remote assistance to students from a central console, and monitor classroom screens to ensure students are on task. Find out more about this workstation management solution.
4/30/2009 3:24:00 PM

Case Study: Granite School District
More and more students in classes at a senior high school were using USB drives to bring applications into the classroom. Because allowing unauthorized programs to run on workstations presents a number of serious challenges to teachers, the school needed to find a way to stop this behavior. Learn about the solution the school used to block distractive software and ensure its computers were used for their intended purpose.

FARONICS: Granite School District Source: Faronics Document Type: Case Study Description: More and more students in classes at a senior high school were using USB drives to bring applications into the classroom. Because allowing unauthorized programs to run on workstations presents a number of serious challenges to teachers, the school needed to find a way to stop this behavior. Learn about the solution the school used to block distractive software and ensure its computers were used for their intended purpose.
4/30/2009 3:19:00 PM

Case Study: University of Nevada—Reno (UNR)
Although students at the University of Nevada’s Reno campus were generally respectful of the campus’s computers and IT policies, entertainment or malicious software often appeared on computer hard drives. This made machines less stable or even disabled them entirely. To combat the problem of computer network security, UNR found a solution that enables automatic shutdown time and safer shared computer workstations.

FARONICS: of Nevada—Reno (UNR) Source: Faronics Document Type: Case Study Description: Although students at the University of Nevada’s Reno campus were generally respectful of the campus’s computers and IT policies, entertainment or malicious software often appeared on computer hard drives. This made machines less stable or even disabled them entirely. To combat the problem of computer network security, UNR found a solution that enables automatic shutdown time and safer shared computer workstations. Case
5/1/2009 1:44:00 PM

Case Study: Newburgh Enlarged City School District
Schools often need to deploy computers that offer a limited feature set, as limiting a computer’s functions is important to protecting its purpose and keeping students focused. To lock down student workstation functionality, Newburgh Enlarged City School District finally implemented a solution to control system settings and application functionality. Learn more about the features and functionality of this workstation access solution.

FARONICS: City School District Source: Faronics Document Type: Case Study Description: Schools often need to deploy computers that offer a limited feature set, as limiting a computer’s functions is important to protecting its purpose and keeping students focused. To lock down student workstation functionality, Newburgh Enlarged City School District finally implemented a solution to control system settings and application functionality. Learn more about the features and functionality of this workstation access
5/1/2009 1:41:00 PM

Non-restrictive Technology in Education: The Reboot-to-restore Concept
Educational institutions represent a unique and complex learning environment from a technological standpoint. Educational instructors are faced with the conundrum of needing to be more knowledgeable about technology in order to ensure that students are appropriately educated; yet they have to continually tighten security because of the growing number of threats—both internally and externally.

FARONICS: The Reboot-to-restore Concept Source: Faronics Document Type: White Paper Description: Educational institutions represent a unique and complex learning environment from a technological standpoint. Educational instructors are faced with the conundrum of needing to be more knowledgeable about technology in order to ensure that students are appropriately educated; yet they have to continually tighten security because of the growing number of threats—both internally and externally. Non-restrictive
4/9/2007 6:54:00 PM

Non-restrictive Technology in Computer-based Businesses and Services
Typically, there are two approaches to managing public access and workplace workstations: the lock-down approach, and the reactionary approach. However, despite the variety of public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology in place, users can use workstations as they desire, but downtime and technical support costs are eliminated.

FARONICS: Businesses and Services Source: Faronics Document Type: White Paper Description: Typically, there are two approaches to managing public access and workplace workstations: the lock-down approach, and the reactionary approach. However, despite the variety of public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology in place, users can use workstations as they desire, but downtime and technical support costs are eliminated.
4/9/2007 6:50:00 PM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others