IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Management

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Management Reports
 
IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012

SearchSecurity.com

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

Cloud-Based Data Protection for Desktop and Laptop Computers: Enable Continuous Data Protection with Cloud-Cased Managed Data Backup
sponsored by IBM
DATA SHEET: Maintaining a comprehensive data backup solution for multiple desktops and laptops across many locations can be expensive. This data sheet discusses how IBM can help safeguard data with a cost-effective cloud-based data backup and restore solution that provides scalable, continuous protection of critical enterprise data.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Clean VPN Approach to Secure Remote Access
sponsored by SonicWALL
WHITE PAPER: In this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
Posted: 25 Jun 2008 | Published: 01 Jun 2008

SonicWALL

Remote Access Problems: BYOD Muddies the Water
sponsored by Carousel Industries
EGUIDE: This expert E-Guide from SearchEnterpriseWAN.com explores the challenges many organizations face when it comes to remote access and pays special attention to the security concerns BYOD brings to your enterprise.
Posted: 21 May 2012 | Published: 18 May 2012

Carousel Industries

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm
sponsored by AVG Technologies USA, Inc.
CASE STUDY: R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement