IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Secure Remote Access

RSS Feed    Add to Google    Add to My Yahoo!
Secure Remote Access Reports
 
Free Download: Secure Remote Access Tools & Techniques
sponsored by ComputerWeekly.com
RESOURCE: Want to discover vendor neutral tips on assessing and implementing remote access software and best practices? Participate in our Secure Remote Access Research Program for an immediate download of our exclusive e-guide, 'Secure Remote Access Tools and Techniques'.
Posted: 19 Jan 2016 | Published: 28 Dec 2015

ComputerWeekly.com

Cloud-Based Data Protection for Desktop and Laptop Computers: Enable Continuous Data Protection with Cloud-Cased Managed Data Backup
sponsored by IBM
DATA SHEET: Maintaining a comprehensive data backup solution for multiple desktops and laptops across many locations can be expensive. This data sheet discusses how IBM can help safeguard data with a cost-effective cloud-based data backup and restore solution that provides scalable, continuous protection of critical enterprise data.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Intel Laptop Strategy featuring Diane Bryant and John Mahvi
sponsored by Intel Corporation
VIDEO: In 1997, Intel IT made a strategic decision to move to laptops based on not only facts, but also a gut instinct. Hear Diane Bryant and John Mahvi explain how that decision helped Intel lower costs, raise productivity, reduce energy and even provide some unexpected benefits.
Posted: 27 May 2009 | Premiered: 23 Mar 2009

Intel Corporation

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.

HP 3Par Secure Service Architecture
sponsored by HPE and Intel®
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HPE and Intel®

Gartner Magic Quadrant for Unified Threat Management
sponsored by Sophos, Inc.
ANALYST REPORT: Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
Posted: 09 May 2013 | Published: 05 Mar 2012

Sophos, Inc.

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies

Technical Guide on Windows Security
sponsored by SearchSecurity.com
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement