IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access SecurityWhite Papers (View All Report Types)
26 - 50 of 83 Matches Previous Page  | Next Page
You Need a Corporate App Store
sponsored by IBM
WHITE PAPER: This white paper outlines the driving forces behind businesses establishing corporate application stores, the benefits of such an approach, and what to seek in a solution that supports this strategy.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

IBM

How to Choose a Managed Network Services Provider
sponsored by MegaPath Inc.
WHITE PAPER: Managing your network is no easy task, hence the reason managed service providers (MSPs) exist. In this resource, explore the advantages of outsourcing to an MSP and best practices for finding the right MSP for your organization.
Posted: 23 May 2012 | Published: 22 May 2012

MegaPath Inc.

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

Simplifying branch office security
sponsored by Sophos, Inc.
WHITE PAPER: Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.
Posted: 06 Apr 2012 | Published: 01 Dec 2011

Sophos, Inc.

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

AT&T Network-based IP VPN Remote Access (ANIRA)
sponsored by AT&T Corp
WHITE PAPER: AT&T Network-based IP VPN Remote Access (ANIRA) offers remote users and traveling users access to corporate information & productivity applications on the fly, whether away from or within the office.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

AT&T Global Network Client: Providing Secure Remote Access with the AT&T Global Network Client
sponsored by AT&T Corp
WHITE PAPER: The AT&T Global Network Client provides secure remote network access anywhere, at any time.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

5 Things You Need to Know About iPad in the Enterprise
sponsored by GroupLogic
WHITE PAPER: The increase of iPads in the work setting brings with it a number of security concerns and risks that enterprises must address. View this white paper to discover the top 5 things you need to know about iPads and integrating them into an enterprise setting, and explore how to protect your corporate assets and mitigate risks.
Posted: 07 Sep 2011 | Published: 06 Sep 2011

GroupLogic

A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

LogMeIn Rescue Case Study: Improving Remote Assistance Efficiency at Sophos
sponsored by LogMeIn, Inc.
WHITE PAPER: Sophos chose LogMein Rescue to help them improve their remote assistance efficiency .LogMeIn Rescue has made the job of administering their remote assistance tool much easier, but it also impacts the tech and the end customer.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

LogMeIn, Inc.

Field Service Mobility Best Practices
sponsored by NetMotion Wireless
WHITE PAPER: Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

NetMotion Wireless

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 16 May 2011 | Published: 29 Oct 2010

Copiun

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
sponsored by Dell and VMware
WHITE PAPER: Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Dell and VMware

Establishing Trust in Remote Access Transactions
sponsored by ActivIdentity Corporation
WHITE PAPER: Most organizations are adding exposure points with growing laptop and smart phone populations seeking remote access. Static passwords are easily stolen. Strong authentication is needed. Read this white paper to find out so much more.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

ActivIdentity Corporation

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.

Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER: In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008

Trend Micro, Inc.

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

Planning for a Pandemic: Turning Office Workers into Mobile Workers for Business Continuity
sponsored by Fiberlink Communications
WHITE PAPER: This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers.
Posted: 20 Jul 2009 | Published: 20 Jul 2009

Fiberlink Communications

Improving the mobile experience through solid state drive
sponsored by Intel Corporation
WHITE PAPER: Intel IT is evaluating solid-state drive (SSD) technology to better understand the benefits to users and the impacts on the enterprise. We have initiated a proof of concept (PoC) study that includes extensive benchmark testing as well as deployment of notebooks with SSDs to the Intel workforce.
Posted: 27 May 2009 | Published: 05 Jan 2009

Intel Corporation

Power efficiency and sustainable Information Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner.
Posted: 27 May 2009 | Published: 23 Dec 2008

Intel Corporation

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation
26 - 50 of 83 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement