IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Network SecurityReports
 
Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by SearchSecurity.com
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

SearchSecurity.com

Nissan Europe Drives Security with HID Global’s Smart Employee ID
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe, which manages their cars across 34 European countries. The organization was on the hunt for a solution that would easily enable future applications and credentials by using a single dual-chip smart card.
Posted: 10 Jul 2014 | Published: 25 Mar 2013

HID

Eguide: Addressing Mobile, Laptop and "Big Data" Backup
sponsored by CommVault Systems, Inc.
EGUIDE: Learn about a deduplication solution designed for remote laptop and desktop data management that can help you overcome today's mobile backup and security challenges. With the ability to search, access and recover content through any Windows, Apple or Android device, this technology can begin simplifying your remote management operations today.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

CommVault Systems, Inc.

A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA, The Security Division of EMC

LogMeIn Rescue Case Study: Improving Remote Assistance Efficiency at Sophos
sponsored by LogMeIn, Inc.
WHITE PAPER: Sophos chose LogMein Rescue to help them improve their remote assistance efficiency .LogMeIn Rescue has made the job of administering their remote assistance tool much easier, but it also impacts the tech and the end customer.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

LogMeIn, Inc.

Next Generation Enterprise WAN Regional WAN Deployment Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to discover a large-scale enterprise networking solution that supports current challenges such as app performance, virtualization, videoconferencing, security, mobility, and cloud computing.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Optimize Application Performance and Security
sponsored by BlueCoat
DATA SHEET: Blue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.
Posted: 15 May 2009 | Published: 14 May 2009

BlueCoat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement