IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access Security Reports
1 - 25 of 167 Matches Previous Page  |  Next Page
Best Practices For Managing Apple in the Enterprise
sponsored by JAMF Software
EGUIDE: In this expert e-guide, review the three Apple and iOS management strategies.
Posted: 24 Nov 2015 | Published: 17 Nov 2015

JAMF Software

Hospital IT Departments Fight To Keep Healthcare BYOD Safe
sponsored by Citrix
EGUIDE: mHealth security can't keep up with the advancement of remote medical devices. This expert e-guide explores why medical device and BYOD mHealth devices go beyond HIPAA compliance concerns and how to address security going forward.
Posted: 18 Nov 2015 | Published: 11 Nov 2015


Best Practices for Mobile Healthcare Security
sponsored by Citrix
EGUIDE: Mobile healthcare security depends on a strong top-down approach that informs employees of all possible threats -- including physical theft and remote device hacks. Read on to find out why.
Posted: 17 Nov 2015 | Published: 30 Mar 2015


Saint Francis Hospital and Medical Center Streamlines Remote Access
sponsored by Citrix
CASE STUDY: In this brief case study, learn how the New England healthcare organization closed a major mobile device security gap and consolidated 1.3 million patient records.
Posted: 16 Nov 2015 | Published: 22 Jul 2015


Southcoast Health System's Mobile Revolution
sponsored by Citrix
CASE STUDY: In this white paper, discover how the organization enabled physicians, visiting nurses and staff seamless, uniform access to patient health records as they move among facilities, while keeping patient information secure and operational overhead costs low.
Posted: 13 Nov 2015 | Published: 15 Jul 2015


Best Practices to Enable Clinician Mobility for Patient-Centric Healthcare
sponsored by Citrix
WHITE PAPER: In this white paper, review mHealth best practices to enable secure remote access to PHI and other sensitive data.
Posted: 12 Nov 2015 | Published: 14 Oct 2014


Mac OS X Security Checklist
sponsored by JAMF Software
WHITE PAPER: This white paper presents a simple strategy for efficiently and successfully implementing the CIS benchmark for OS X to secure Mac users from data loss/theft. Read on to learn more.
Posted: 11 Nov 2015 | Published: 29 Oct 2015

JAMF Software

Healthcare eCredentials: Security, Mobility, Collaboration
sponsored by Citrix
WHITE PAPER: Discover how to empower healthcare professionals to connect with patients and perform critical processes and objectives regardless of location or device.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


Apple Native Security
sponsored by JAMF Software
WHITE PAPER: Learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.
Posted: 09 Nov 2015 | Published: 31 Dec 2014

JAMF Software

Clinical Mobile Workspace: Transform Care, Reduce Costs, and Accelerate Change
sponsored by Citrix
WHITE PAPER: Learn how to provide a secure clinical mHealth workspace that extends beyond the four walls of your organization to provide improved care to patients in this white paper.
Posted: 06 Nov 2015 | Published: 14 Oct 2014


Macs in the Wild: Securing Your Mobile Workforce and Their Devices
sponsored by Centrify Corporation
WEBCAST: This webinar, presented by Jason Snell, Editor in Chief with Six Colors, and Peter Havens, Director of Product Management with Centrify, teaches you how to set up a strong defense against would be device, identity and data theft for your mobile workforce.
Posted: 03 Nov 2015 | Premiered: Sep 4, 2015

Centrify Corporation

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

Avoid Threats on Mobile Health Devices with Healthcare Security Best Practices
sponsored by CloudMine
EGUIDE: Explore expert analyses on how to protect mobile health data and devices in 4 steps. Continue reading to learn 7 best practices for bolstering your mHealth security strategy
Posted: 28 Oct 2015 | Published: 07 Oct 2015

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014


Securing Direct-To-Internet Branch Offices
sponsored by OpenDNS
WHITE PAPER: In this white paper, uncover the challenges of relying on a security model that requires network traffic to return to a centralized location. Access this resource to learn how to bridge the gap between performance and security for remote office workers.
Posted: 08 Oct 2015 | Published: 15 Jul 2015


7 Cloud Security Risks That Will Ruin Your Day
sponsored by Intel and IBM
EGUIDE: This expert e-Guide presents today's top 7 cloud security risks that challenge organizations.
Posted: 29 Sep 2015 | Published: 09 Sep 2015

Intel and IBM

Remote access your users will love
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This white paper uncovers the growing user challenges with remote access strategies. Download now to learn the key features a remote access strategy should encompass that balances IT's requirements for security and manageability with users expectations and discover an end-to-end remote access strategy.
Posted: 17 Sep 2015 | Published: 29 Mar 2013

Dell, Inc. and IntelĀ®

ADS Securities Reduces Mobility Costs Without Compromising Usability for Employees
sponsored by VMware, Inc.
WHITE PAPER: This case study follows ADS Securities in their pursuit of an EMM solution capable of supporting wider device choice, enabling telecom expense control, and securing remote access to corporate data. View now to learn how the company achieved reduced IT costs without sacrificing usability for employees.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

VMware, Inc.

The Top 10 Considerations in Choosing an Enterprise Collaboration Tool
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper provides 10 considerations that could help make your organization's transition to mobile collaboration simpler. Read on to further explore the process of adopting a secure collaboration platform.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

What If Your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc.
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 04 Sep 2015 | Premiered: 20 Jan 2015

Dell, Inc.

Keeping Your Mobile Security Strategy on Pace
sponsored by Lookout
EGUIDE: This expert e-guide outlines the advancement of mobile security threats and how IT is failing to address them.
Posted: 31 Aug 2015 | Published: 21 Aug 2015


Managing App Sideloading Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about how attackers sideload iOS apps and how to mitigate those threats.
Posted: 25 Aug 2015 | Published: 19 Aug 2015


Predictive Security - Using Big Data to Unmask Mobile Threats
sponsored by Lookout
WHITE PAPER: This paper explains how predictive security leverages big data to pre-empt mobile threats before they can do harm. See examples of how predictive security was able to thwart two destructive mobile apps.
Posted: 24 Aug 2015 | Published: 05 Aug 2015


The Productivity Transformation: Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 12 Aug 2015 | Published: 15 Jul 2015


Mobile is the New Playground for Thieves: How to Protect Against Mobile Malware
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how to move towards a proactive mobile security strategy to detect, analyze, and remediate today's mobile threats.
Posted: 12 Aug 2015 | Published: 13 Jul 2015

1 - 25 of 167 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement