IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Secure Remote Access

RSS Feed    Add to Google    Add to My Yahoo!
Secure Remote Access White Papers (View All Report Types)
 
BYOD & the Cloud: Security Harmony
sponsored by NaviSite, Inc.
WHITE PAPER: This white paper examines how enterprise mobility management (EMM), desktop-as-a-service (DaaS), and a managed Office 365 implementation help address these challenges play a critical role in making BYOD a success. Discover how to enhance your BYOD strategy in this resourceful white paper.
Posted: 21 Dec 2015 | Published: 08 Dec 2015

NaviSite, Inc.

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett Packard Enterprise

Wireless Handheld Devices Become Trusted Network Devices
sponsored by Intel Corporation
WHITE PAPER: Read this white paper that details a new solution that allows employees to use their handheld device as a trusted device on the corporate network.
Posted: 31 Aug 2007 | Published: 01 Jan 2006

Intel Corporation

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Enterprise-Scale Console & Terminal Window Server Session Recording
sponsored by ObserveIT
WHITE PAPER: Read this white paper to learn how Windows session recording technology can help verify that 3rd party and internal privileged users are compliant with corporate policy.
Posted: 26 Mar 2008 | Published: 01 Mar 2008

ObserveIT

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 16 May 2011 | Published: 29 Oct 2010

Copiun

IMS Ready and Raring to Go: A New World of Voice, Video, and Data
sponsored by F5 Networks
WHITE PAPER: The beliefs that IMS architecture is nearly identical to SOA within the enterprise application development market are not without merit. Read this paper to learn the key differences.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement