IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Secure Remote Access

RSS Feed    Add to Google    Add to My Yahoo!
Secure Remote Access Reports
 
5 Key Business Insights for Mobile Security in a BYOD World
sponsored by Lookout
WHITE PAPER: In this white paper, take a closer look at 5 key insights about mobile security and enabling BYOD in your workplace.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Lookout

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Next Generation Enterprise WAN Regional WAN Deployment Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to discover a large-scale enterprise networking solution that supports current challenges such as app performance, virtualization, videoconferencing, security, mobility, and cloud computing.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Network Evolution: Building the Infrastructure to Enable the Changing Face of IT
sponsored by OnX USA LLC
EZINE: This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets.
Posted: 14 Jun 2012 | Published: 02 Apr 2012

OnX USA LLC

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies

Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

Why SSL VPN Still Matters
sponsored by F5 Networks
WHITE PAPER: This resource showcases a two-pronged approach to secure remote access afforded by SSL VPN solutions, which provide comprehensive security and mobile access for all devices running Android. Find out why SSL VPN will continue to be important to corporate remote access strategies.
Posted: 15 Nov 2013 | Published: 13 Jan 2012

F5 Networks

Technical Guide on Windows Security
sponsored by SearchSecurity.com
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SearchSecurity.com

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement