IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Secure Remote Access

RSS Feed    Add to Google    Add to My Yahoo!
Secure Remote Access White Papers (View All Report Types)
 
Empowering business mobility through virtualization
sponsored by Citrix
WHITE PAPER: Desktop and application virtualization can help you embrace workshifting, consumerization, Bring Your Own Device (BYOD) and other mobile initiatives without sacrificing security. This white paper explores the factors of a successful mobility project and explains how you can craft comprehensive BYOD policies.
Posted: 27 Sep 2012 | Published: 22 Jun 2012

Citrix

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
sponsored by Dell and VMware
WHITE PAPER: Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Dell and VMware

The Art of Teleworking
sponsored by Polycom, Inc.
WHITE PAPER: This paper analyzes the teleworker's primary challenges and offers ideas for overcoming them. It highlights the advances of technology that make teleworking truly successful and of greater benefit to both teleworkers and their organizations.
Posted: 05 Sep 2012 | Published: 31 Oct 2011

Polycom, Inc.

Security Across the Enterprise: Protect and Empower Your Branch Offices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.
Posted: 11 Jun 2013 | Published: 16 Oct 2008

Cisco Systems, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

At-a-Glance: Cisco Regional WAN Solution Overview
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to learn how to upgrade your enterprise networking solution to deliver exciting new services such as cloud computing, virtual desktops, videoconferencing, and more to your remote branch-office environments in a secure, highly scalable, tightly integrated manner.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

Next Generation Enterprise WAN Regional WAN Deployment Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to discover a large-scale enterprise networking solution that supports current challenges such as app performance, virtualization, videoconferencing, security, mobility, and cloud computing.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement