IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Secure Remote Access

RSS Feed    Add to Google    Add to My Yahoo!
Secure Remote Access Reports
 
Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com

SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions
sponsored by SearchWinIT
EZINE: Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.
Posted: 20 Oct 2009 | Published: 20 Oct 2009

SearchWinIT

Food Manufacturer Extends Its Workforce with Secure Remote Access
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition.
Posted: 08 Jul 2008 | Published: 01 Apr 2008

Cisco Systems, Inc.

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
sponsored by Dell and VMware
WHITE PAPER: Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Dell and VMware

LogMeIn Rescue Case Study: Improving Remote Assistance Efficiency at Sophos
sponsored by LogMeIn, Inc.
WHITE PAPER: Sophos chose LogMein Rescue to help them improve their remote assistance efficiency .LogMeIn Rescue has made the job of administering their remote assistance tool much easier, but it also impacts the tech and the end customer.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

LogMeIn, Inc.

Security Across the Enterprise: Protect and Empower Your Branch Offices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.
Posted: 11 Jun 2013 | Published: 16 Oct 2008

Cisco Systems, Inc.

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies

Intel® Centrino® Duo Processor Technology with Intel® Core™2 Duo Processor
sponsored by Intel Corporation
WHITE PAPER: This fact sheet details a new technology that provides five times faster wireless performance and two times better range than 802.11 a/g solutions.
Posted: 29 Nov 2013 | Published: 01 Nov 2007

Intel Corporation

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by SearchNetworking.com
EZINE: In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

SearchNetworking.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement