IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access Security Reports
1 - 25 of 150 Matches Previous Page  |  Next Page
Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

Putting The UX Into VPN
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about the challenges associated with current VPN technology. Discover a VPN authentication platform designed to give customers a simplified, more secure VPN.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

Nissan Europe Drives Security with Dual-Chip Smart Cards
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe and how they easily enabled future applications and credentials by using a single dual-chip smart card. Read on to learn more about Nissan's success with ID cards and if this strategy is right for your security needs.
Posted: 24 Jul 2015 | Published: 25 Mar 2013

HID

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix

Mobility Myth Busting: BYOD, Tablets and Mobile Apps
sponsored by Dell, Inc.
WHITE PAPER: This brief white paper presents the 3 key myths that are holding enterprise mobility strategies back and explains how to move beyond them to become a truly successful mobile business.
Posted: 20 Jul 2015 | Published: 28 Nov 2014

Dell, Inc.

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

How to Choose the Right EMM Platform
sponsored by IBM
WHITE PAPER: This exclusive resource compares the top EMM platforms today and provides key takeaways for each one.
Posted: 15 Jul 2015 | Published: 30 Sep 2014

IBM

Enterprise Mobility Productivity Checklist
sponsored by Acronis
WHITE PAPER: Access this white paper for a checklist of the 7 essential steps you must take to create a productive mobile environment for your enterprise.
Posted: 29 Jun 2015 | Published: 26 Dec 2014

Acronis

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn about the core strengths of Citrix NetScaler paired with Unified Gateway for secure remote access consolidation.
Posted: 05 Jun 2015 | Published: 29 May 2015

Citrix

Delivering Secure Remote Access for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: This white paper takes a closer look at wireless network security challenges. Read on and discover how you can provide secure remote access for the modern, mobile enterprise.
Posted: 04 Jun 2015 | Published: 29 May 2015

Citrix

How You Can Deliver Scalable, Graphics-Rich Virtual Desktops
sponsored by NVIDIA
WHITE PAPER: Download and discover how NVIDIA is redefining virtualization by delivering quality interactive visual experiences with a GPU that can be implemented at scale. Read on and learn how you can gain a competitive edge with all the technology you need to fully virtualize enterprise computing.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

NVIDIA

Consolidate Your Secure Remote Access Delivery Infrastructure with One URL
sponsored by Citrix
WHITE PAPER: Access this white paper to how you can unify your secure remote access infrastructure.
Posted: 01 Jun 2015 | Published: 29 May 2015

Citrix

Configuring MS SQL Server for Remote Access
sponsored by Rackspace
RESOURCE: To learn how your organization can configure your Microsoft SQL server for remote access, check out this exclusive guide. Learn about the role Windows firewall plays in the issue and discover 5 easy steps to help you configure it to access your SQL server remotely.
Posted: 08 May 2015 | Published: 04 Nov 2013

Rackspace

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

The VMware View Business Process Desktop
sponsored by VMware
WHITE PAPER: Inside this brief white paper, discover a technology that enables customers looking to outsource or offshore business processes to effectively scale their business on demand, streamline and centralize desktop management and provide end users with a secure desktop experience across the LAN and WAN.
Posted: 16 Mar 2015 | Published: 31 Dec 2012

VMware

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

Taking Authentication Beyond Passwords for Secure Always-On Mobile Access
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Next-Level Authentication: Intelligent Location-Based Strategies
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Remote Management for the Financial Sector
sponsored by Emerson Network Power
VIDEO: This video explains the role of out-of-band access in the disaster recovery process. It also highlights how an out of band solution can provide access even when the network is down, allowing for remote diagnostics and problem fixing capabilities.
Posted: 22 May 2014 | Premiered: 22 May 2014

Emerson Network Power

Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com

Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 23 May 2014 | Published: 03 Mar 2014

Citrix
1 - 25 of 150 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement