IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access Security White Papers (View All Report Types)
1 - 25 of 90 Matches Previous Page  |  Next Page
The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Your network security strategy needs to span your enterprise. Access this white paper to learn why network security is becoming increasingly difficult and how to best overcome these pain points with a proven network architecture and strategy to kelp you best mitigate security issues.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Secure Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: An organization's remote access strategy focuses on IT priorities—protecting the enterprise network and avoiding unnecessary complexity. But the ultimate customer is the user who depends on reliable access to get work done. Learn how IT can address its requirements while delivering a solution people love.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

Citrix

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will address the productivity gap that traditional remote access causes. Access now to discover a centralized controller, a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

Why Laptop Security Cannot Wait
sponsored by Commvault
WHITE PAPER: This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.
Posted: 04 Dec 2015 | Published: 02 Dec 2015

Commvault

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

Securing Direct-To-Internet Branch Offices
sponsored by OpenDNS
WHITE PAPER: In this white paper, discover how to protect direct-to-internet traffic in remote/branch offices. Access this resource and examine if as-a-service offerings are the key to bridging the gap between performance and security for remote office workers.
Posted: 08 Oct 2015 | Published: 15 Jul 2015

OpenDNS

Remote access your users will love
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper uncovers the growing user challenges with remote access strategies. Download now to learn the key features a remote access strategy should encompass that balances IT's requirements for security and manageability with users expectations and discover an end-to-end remote access strategy.
Posted: 17 Sep 2015 | Published: 29 Mar 2013

Dell, Inc. and Intel®

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Delivering the NHS Network of the Future
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.
Posted: 19 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Putting the UX Into VPN
sponsored by BlackBerry
WHITE PAPER: This white paper explores the challenges associated with current VPN technology and the need for a better solution. Read on to discover a VPN authentication platform designed to give customers a simplified, more secure VPN.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix

Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 23 May 2014 | Published: 03 Mar 2014

Citrix

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Intel® Centrino® Duo Processor Technology with Intel® Core™2 Duo Processor
sponsored by Intel Corporation
WHITE PAPER: This fact sheet details a new technology that provides five times faster wireless performance and two times better range than 802.11 a/g solutions.
Posted: 29 Nov 2013 | Published: 01 Nov 2007

Intel Corporation

Why SSL VPN Still Matters
sponsored by F5 Networks
WHITE PAPER: This resource showcases a two-pronged approach to secure remote access afforded by SSL VPN solutions, which provide comprehensive security and mobile access for all devices running Android. Find out why SSL VPN will continue to be important to corporate remote access strategies.
Posted: 15 Nov 2013 | Published: 13 Jan 2012

F5 Networks

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett Packard Enterprise

Security Across the Enterprise: Protect and Empower Your Branch Offices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.
Posted: 11 Jun 2013 | Published: 16 Oct 2008

Cisco Systems, Inc.

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

Empowering business mobility through virtualization
sponsored by Citrix
WHITE PAPER: Desktop and application virtualization can help you embrace workshifting, consumerization, Bring Your Own Device (BYOD) and other mobile initiatives without sacrificing security. This white paper explores the factors of a successful mobility project and explains how you can craft comprehensive BYOD policies.
Posted: 27 Sep 2012 | Published: 22 Jun 2012

Citrix

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software
1 - 25 of 90 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement