IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access SecurityReports
1 - 25 of 145 Matches Previous Page  | Next Page
Exercising Control Over Mobile Access
sponsored by Aruba Networks
EGUIDE: In this expert e-guide, explore several tips for managing mobile authentication methods and learn how to control what mobile devices can and cannot do inside your network.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

Aruba Networks

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST: This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014

HID

The Convergence of Physical and Logical Access
sponsored by HID
WEBCAST: This webcast explores the convergence of physical and logical access with a single access card, as well as managing and reporting through a single portal.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

KAS BANK Discovers a Better Way to Secure High-value Transactions
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a solution that delivered the highest level of security with a reusable infrastructure.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

European Mobile Phone Retailer, the Carphone Warehouse, Secures Employee Remote Access with HID Global’s Authentication Solutions
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secures employee remote access. Read on to find out why this retailer chose HID Global over other vendors due to the strong authentication characteristics behind it.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

Weather centre secures remote access with HID Global’s strong authentication
sponsored by HID
CASE STUDY: In this case study featuring The European Centre for Medium Range Weather Forecasts (ECMWF), forecasts are gathered through data from satellites, buoys, ships and aircrafts—and all facilities across Europe need to remotely access this information.
Posted: 11 Jul 2014 | Published: 25 Mar 2013

HID

Nissan Europe Drives Security with HID Global’s Smart Employee ID
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe, which manages their cars across 34 European countries. The organization was on the hunt for a solution that would easily enable future applications and credentials by using a single dual-chip smart card.
Posted: 10 Jul 2014 | Published: 25 Mar 2013

HID

Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 23 May 2014 | Published: 03 Mar 2014

Citrix

Secure Remote Access Tools and Techniques
sponsored by TechTarget
RESOURCE: Share your top secure remote access plans, priorities, and challenges for next year and you'll gain exclusive access to "Secure Remote Access Tools and Techniques" – a reference guide compiled by our editorial experts that is guaranteed to help you provide faster, more secure remote access support to end-users.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Preparing your Organisation to Defend Against Cyber Crime
sponsored by TechTarget
RESOURCE: With networks growing larger and evermore complex, what information security professionals need most to secure their systems are a sharp eye and a clear plan. Is your organisation's security strategy aligned to best defend against hackers? Take this brief survey and gain access to our eguide, Countering Cybercrime With a Sharp Eye and a Clear Plan.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Set yourself apart from the rest with this secure enterprise platform
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how Red Hat Enterprise Linux delivers an exceptionally secure, open source server platform via an extensive set of processes and practices.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

Red Hat

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Intel® Centrino® Duo Processor Technology with Intel® Core™2 Duo Processor
sponsored by Intel Corporation
WHITE PAPER: This fact sheet details a new technology that provides five times faster wireless performance and two times better range than 802.11 a/g solutions.
Posted: 29 Nov 2013 | Published: 01 Nov 2007

Intel Corporation

Why SSL VPN Still Matters
sponsored by F5 Networks
WHITE PAPER: This resource showcases a two-pronged approach to secure remote access afforded by SSL VPN solutions, which provide comprehensive security and mobile access for all devices running Android. Find out why SSL VPN will continue to be important to corporate remote access strategies.
Posted: 15 Nov 2013 | Published: 13 Jan 2012

F5 Networks

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee
1 - 25 of 145 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement