IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Network Security Reports
 
Strong Authentication: Securing Identities and Enabling Productivity
sponsored by Gemalto
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Gemalto

Achieve business continuity and keep people productive with remote access
sponsored by Citrix
WHITE PAPER: This white paper discusses an approach to business continuity that leverages multiple virtualization technologies to provide the flexible mobile and remote access needed to keep the workforce connected to the critical apps and data they depend on.
Posted: 06 Aug 2015 | Published: 31 May 2013

Citrix

Managing App Sideloading Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about how attackers sideload iOS apps and how to mitigate those threats.
Posted: 25 Aug 2015 | Published: 19 Aug 2015

Lookout

A Full and Secure Mobile Platform in 30 Minutes or Less
sponsored by IBM
PODCAST: In this podcast, you'll gain a comprehensive understanding of mobility management in organizations today. Listen in and learn how to secure mobile devices and enterprise data in 30 minutes or less.
Posted: 11 Aug 2015 | Premiered: Jul 1, 2014

IBM

Empowering business mobility through virtualization
sponsored by Citrix
WHITE PAPER: Desktop and application virtualization can help you embrace workshifting, consumerization, Bring Your Own Device (BYOD) and other mobile initiatives without sacrificing security. This white paper explores the factors of a successful mobility project and explains how you can craft comprehensive BYOD policies.
Posted: 27 Sep 2012 | Published: 22 Jun 2012

Citrix

Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER: In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008

Trend Micro, Inc.

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

Remote Access Problems: BYOD Muddies the Water
sponsored by Carousel Industries
EGUIDE: This expert E-Guide from SearchEnterpriseWAN.com explores the challenges many organizations face when it comes to remote access and pays special attention to the security concerns BYOD brings to your enterprise.
Posted: 21 May 2012 | Published: 18 May 2012

Carousel Industries

Intel® Centrino® Duo Processor Technology with Intel® Core™2 Duo Processor
sponsored by Intel Corporation
WHITE PAPER: This fact sheet details a new technology that provides five times faster wireless performance and two times better range than 802.11 a/g solutions.
Posted: 29 Nov 2013 | Published: 01 Nov 2007

Intel Corporation

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement