IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access Security Reports
1 - 25 of 152 Matches Previous Page  |  Next Page
Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Guide to Flexible Working
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

ComputerWeekly.com

The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Secure Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: An organization's remote access strategy focuses on IT priorities—protecting the enterprise network and avoiding unnecessary complexity. But the ultimate customer is the user who depends on reliable access to get work done. Learn how IT can address its requirements while delivering a solution people love.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

Citrix

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: There's a gap in productivity caused by traditional remote access. Discover a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

Are You Doing All You Can To Protect Your Critical Business Information?
sponsored by Citrix
DATA SHEET: This infographic details 7 best practices to protect your critical business information while empowering workers to access it from any location or device. Discover how a policy-driven approach to information security can mitigate threats and data breaches in your mobile workforce.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Citrix

Free Download: Secure Remote Access Tools & Techniques
sponsored by ComputerWeekly.com
RESOURCE: Want to discover vendor neutral tips on assessing and implementing remote access software and best practices? Participate in our Secure Remote Access Research Program for an immediate download of our exclusive e-guide, 'Secure Remote Access Tools and Techniques'.
Posted: 19 Jan 2016 | Published: 28 Dec 2015

ComputerWeekly.com

5 Key Business Insights for Mobile Security in a BYOD World
sponsored by Lookout
WHITE PAPER: In this white paper, take a closer look at 5 key insights about mobile security and enabling BYOD in your workplace.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Lookout

Why Laptop Security Cannot Wait
sponsored by Commvault
WHITE PAPER: This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.
Posted: 04 Dec 2015 | Published: 02 Dec 2015

Commvault

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

Securing Direct-To-Internet Branch Offices
sponsored by OpenDNS
WHITE PAPER: In this white paper, discover how to protect direct-to-internet traffic in remote/branch offices. Access this resource and examine if as-a-service offerings are the key to bridging the gap between performance and security for remote office workers.
Posted: 08 Oct 2015 | Published: 15 Jul 2015

OpenDNS

Remote access your users will love
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper uncovers the growing user challenges with remote access strategies. Download now to learn the key features a remote access strategy should encompass that balances IT's requirements for security and manageability with users expectations and discover an end-to-end remote access strategy.
Posted: 17 Sep 2015 | Published: 29 Mar 2013

Dell, Inc. and Intel®

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Top Use Cases for App Virtualization
sponsored by Citrix
WEBCAST: In this webcast, discover several top use cases for application virtualization, complete with real world customer examples. Additionally, learn about common business challenges facing the industry today.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Citrix

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

Delivering the NHS Network of the Future
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.
Posted: 19 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Consolidating Security to Increase Performance and Lower Costs
sponsored by Fortinet, Inc.
CASE STUDY: This case study describes the solution that enabled a healthcare organization to compress, accelerate, and encrypt connections to low bandwidth remote locations without the need for additional devices.
Posted: 16 Feb 2016 | Published: 21 May 2015

Fortinet, Inc.

How to Predict, Detect, and Protect Against Mobile Cyber Attacks
sponsored by Skycure
WEBCAST: This webcast explores the current enterprise mobility management (EMM) strategies available as well as the benefits of implementing active threat detection to stop malware attacks as they come into the enterprise. Download now to learn how to secure all endpoints within the organizational walls and beyond.
Posted: 04 Dec 2015 | Premiered: Oct 28, 2015

Skycure

Securing 35,000 Mobile Devices
sponsored by Skycure
CASE STUDY: In this case study, learn how New York Life, an insurance company with over 35,000 mobile devices in use by employees, closed vulnerability gaps.
Posted: 01 Dec 2015 | Published: 11 Nov 2015

Skycure

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix
1 - 25 of 152 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement