IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Management

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Management Reports
 
Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com

Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Optimize Application Performance and Security
sponsored by BlueCoat
DATA SHEET: Blue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.
Posted: 15 May 2009 | Published: 14 May 2009

BlueCoat

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA

AT&T Network-based IP VPN Remote Access (ANIRA)
sponsored by AT&T Corp
WHITE PAPER: AT&T Network-based IP VPN Remote Access (ANIRA) offers remote users and traveling users access to corporate information & productivity applications on the fly, whether away from or within the office.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
sponsored by Dell and VMware
WHITE PAPER: Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Dell and VMware

Power efficiency and sustainable Information Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner.
Posted: 27 May 2009 | Published: 23 Dec 2008

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement