IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access Security Reports
26 - 50 of 155 Matches Previous Page  |  Next Page
Configuring MS SQL Server for Remote Access
sponsored by Rackspace
RESOURCE: To learn how your organization can configure your Microsoft SQL server for remote access, check out this exclusive guide. Learn about the role Windows firewall plays in the issue and discover 5 easy steps to help you configure it to access your SQL server remotely.
Posted: 08 May 2015 | Published: 04 Nov 2013

Rackspace

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

Taking Authentication Beyond Passwords for Secure Always-On Mobile Access
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Next-Level Authentication: Intelligent Location-Based Strategies
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Expert guide to remote access tools and technologies
sponsored by TechTarget
RESOURCE: Providing remote access to applications and company data from end-user devices can pose significant security and management challenges. So how do you satisfy user demands for anytime, anywhere access to your network, without putting your sensitive information at risk? Find out inside this exclusive resource.
Posted: 18 Mar 2014 | Published: 23 Feb 2015

TechTarget

Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by SearchSecurity.com
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

SearchSecurity.com

Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com

Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 23 May 2014 | Published: 03 Mar 2014

Citrix

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Intel® Centrino® Duo Processor Technology with Intel® Core™2 Duo Processor
sponsored by Intel Corporation
WHITE PAPER: This fact sheet details a new technology that provides five times faster wireless performance and two times better range than 802.11 a/g solutions.
Posted: 29 Nov 2013 | Published: 01 Nov 2007

Intel Corporation

Why SSL VPN Still Matters
sponsored by F5 Networks
WHITE PAPER: This resource showcases a two-pronged approach to secure remote access afforded by SSL VPN solutions, which provide comprehensive security and mobile access for all devices running Android. Find out why SSL VPN will continue to be important to corporate remote access strategies.
Posted: 15 Nov 2013 | Published: 13 Jan 2012

F5 Networks

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett-Packard Company
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett-Packard Company

Security Across the Enterprise: Protect and Empower Your Branch Offices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.
Posted: 11 Jun 2013 | Published: 16 Oct 2008

Cisco Systems, Inc.

Gartner Magic Quadrant for Unified Threat Management
sponsored by Sophos, Inc.
ANALYST REPORT: Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
Posted: 09 May 2013 | Published: 05 Mar 2012

Sophos, Inc.

A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.
Posted: 03 May 2013 | Published: 07 May 2013

MicroScope

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

Empowering business mobility through virtualization
sponsored by Citrix
WHITE PAPER: Desktop and application virtualization can help you embrace workshifting, consumerization, Bring Your Own Device (BYOD) and other mobile initiatives without sacrificing security. This white paper explores the factors of a successful mobility project and explains how you can craft comprehensive BYOD policies.
Posted: 27 Sep 2012 | Published: 22 Jun 2012

Citrix

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

The Art of Teleworking
sponsored by Polycom, Inc.
WHITE PAPER: This paper analyzes the teleworker's primary challenges and offers ideas for overcoming them. It highlights the advances of technology that make teleworking truly successful and of greater benefit to both teleworkers and their organizations.
Posted: 05 Sep 2012 | Published: 31 Oct 2011

Polycom, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard
26 - 50 of 155 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement