IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Access Management, Remote Access Network Security, Secure Remote Access
DEFINITION: The ability to access a network in a secure fashion remotely.
Remote Access SecurityReports
51 - 75 of 143 Matches Previous Page  | Next Page
Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by SearchSecurity.com
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

SearchSecurity.com

Eguide: Addressing Mobile, Laptop and "Big Data" Backup
sponsored by CommVault Systems, Inc.
EGUIDE: Learn about a deduplication solution designed for remote laptop and desktop data management that can help you overcome today's mobile backup and security challenges. With the ability to search, access and recover content through any Windows, Apple or Android device, this technology can begin simplifying your remote management operations today.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

CommVault Systems, Inc.

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel

Technical Guide on Windows Security
sponsored by SearchSecurity.com
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SearchSecurity.com

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

AT&T Network-based IP VPN Remote Access (ANIRA)
sponsored by AT&T Corp
WHITE PAPER: AT&T Network-based IP VPN Remote Access (ANIRA) offers remote users and traveling users access to corporate information & productivity applications on the fly, whether away from or within the office.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

AT&T Global Network Client: Providing Secure Remote Access with the AT&T Global Network Client
sponsored by AT&T Corp
WHITE PAPER: The AT&T Global Network Client provides secure remote network access anywhere, at any time.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

AT&T Mobile Remote Access Services
sponsored by AT&T Corp
PRODUCT OVERVIEW: AT&T's Mobile Remote Access Services provides flexible, highly secure access to corporate assets for all users.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AT&T Corp

Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

5 Things You Need to Know About iPad in the Enterprise
sponsored by GroupLogic
WHITE PAPER: The increase of iPads in the work setting brings with it a number of security concerns and risks that enterprises must address. View this white paper to discover the top 5 things you need to know about iPads and integrating them into an enterprise setting, and explore how to protect your corporate assets and mitigate risks.
Posted: 07 Sep 2011 | Published: 06 Sep 2011

GroupLogic

Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE: Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Information Security Magazine

A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Cloud-Based Data Protection for Desktop and Laptop Computers: Enable Continuous Data Protection with Cloud-Cased Managed Data Backup
sponsored by IBM
DATA SHEET: Maintaining a comprehensive data backup solution for multiple desktops and laptops across many locations can be expensive. This data sheet discusses how IBM can help safeguard data with a cost-effective cloud-based data backup and restore solution that provides scalable, continuous protection of critical enterprise data.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

LogMeIn Rescue Case Study: Improving Remote Assistance Efficiency at Sophos
sponsored by LogMeIn, Inc.
WHITE PAPER: Sophos chose LogMein Rescue to help them improve their remote assistance efficiency .LogMeIn Rescue has made the job of administering their remote assistance tool much easier, but it also impacts the tech and the end customer.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

LogMeIn, Inc.

Field Service Mobility Best Practices
sponsored by NetMotion Wireless
WHITE PAPER: Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

NetMotion Wireless

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration
sponsored by Thawte Inc.
EGUIDE: Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.
Posted: 19 May 2011 | Published: 19 May 2011

Thawte Inc.

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 16 May 2011 | Published: 29 Oct 2010

Copiun

Focus on Endpoint Data Protection
sponsored by Druva Software
EGUIDE: Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Druva Software

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
sponsored by Dell and VMware
WHITE PAPER: Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Dell and VMware

Establishing Trust in Remote Access Transactions
sponsored by ActivIdentity Corporation
WHITE PAPER: Most organizations are adding exposure points with growing laptop and smart phone populations seeking remote access. Static passwords are easily stolen. Strong authentication is needed. Read this white paper to find out so much more.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

ActivIdentity Corporation

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA, The Security Division of EMC

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.
51 - 75 of 143 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement