Remote Logins White Papers

(View All Report Types)
Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Expertise and On Hand at all Times
sponsored by TeamViewer
CASE STUDY: CANCOM successfully entered the IT market around three decades ago and is now one of Germany’s largest IT service providers. They rely on TeamViewer Tensor, the solution for enterprise-level digital service processes, to support more than 20,000 customers worldwide. Discover why the partnership is so valuable to CANCOM in this case study.
Posted: 28 Mar 2024 | Published: 28 Mar 2024

TOPICS:  .NET
TeamViewer

Enterprise Backup for the Remote World: Are You Ready?
sponsored by Cobalt Iron
WHITE PAPER: This white paper explores how enterprises can establish secure remote backup and data protection with Cobalt Iron Compass. Inside, you’ll learn how your business can run hands-free backup and ensure data recoverability - all while simplifying management. Read the full white paper now to learn more.
Posted: 14 Jun 2024 | Published: 14 Jun 2024

TOPICS:  .NET
Cobalt Iron

Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Keeper Remote Browser Isolation Securely isolate web browsing activities from end-user devices, mitigating cybersecurity threats by hosting browsing sessions in a controlled remote environment
sponsored by Keeper Security Inc
PRODUCT OVERVIEW: Keeper's Remote Browser Isolation mitigates cybersecurity threats by hosting browsing sessions in a controlled remote environment, without a VPN. Secure access, zero-knowledge security, and comprehensive auditing make compliance a breeze. Read the full data sheet to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

Keeper Security Inc

How Aegean Baltic Bank Secures its Financial Data and Remote Workforce
sponsored by Checkpoint Software Technologies
CASE STUDY: Aegean Baltic Bank secures its financial data and remote workforce with Check Point's security solutions. The bank's network and transactions are protected from cyber threats, and centralized management ensures efficient security operations. Read the full case study to learn how Check Point's architecture meets the bank's evolving security needs.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Checkpoint Software Technologies

MicroScope – November 2020: Simplify the path to partner programmes
sponsored by MicroScope
EZINE: In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
Posted: 08 Feb 2021 | Published: 06 Nov 2020

MicroScope

Scalable, secure enterprise access and support with TeamViewer Tensor
sponsored by TeamViewer
PRODUCT OVERVIEW: Enterprises and growing businesses must efficiently support remote workforces, diverse systems, and distant assets in real time for effective, secure operations. Learn more on how a 360° cloud-based remote connectivity solution enhances support for customers, employees, and partners throughout the value chain in this resource.
Posted: 08 Dec 2023 | Published: 09 Dec 2023

TOPICS:  .NET
TeamViewer

Essential Guide: How APAC firms can ride out the pandemic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.
Posted: 28 Jun 2021 | Published: 29 Jun 2021

TechTarget ComputerWeekly.com

CW APAC: Trend Watch - business response to coronavirus
sponsored by TechTarget ComputerWeekly.com
EZINE: With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.
Posted: 08 Feb 2021 | Published: 14 May 2020

TechTarget ComputerWeekly.com

Anatomy Of Identity Based Attacks
sponsored by Okta
WHITE PAPER: 74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024

TOPICS:  .NET
Okta

Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.
Posted: 24 Jun 2022 | Published: 28 Jun 2022

TechTarget ComputerWeekly.com

Multi-Factor Authentication Deployment Guide
sponsored by Okta
WHITE PAPER: Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
Okta

Zero Trust Access For Dummies, 3rd Fortinet Special Edition
sponsored by Fortinet, Inc.
EBOOK: In this eBook, you’ll learn all about Zero Trust Network Access (ZTNA) technology and the strategy for securing users’ remote access. After reading “Zero Trust Access For Dummies,” you will know how to control what devices connect to your network and applications – and much more.
Posted: 18 Oct 2024 | Published: 02 Oct 2024

Fortinet, Inc.

MicroScope – November 2021: Scaling the skills shortage
sponsored by MicroScope
EZINE: Navigating the challenges of retaining talent is an increasing concern for the channel, with many professionals set to change jobs – discover why this is and how big of a problem the industry faces. Also read about the increase in demand for anything as a service, and why exactly the channel keeps enduring through the years
Posted: 04 Nov 2021 | Published: 05 Nov 2021

MicroScope

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

TechTarget ComputerWeekly.com

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.
Posted: 15 Mar 2021 | Published: 16 Mar 2021

TechTarget ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Protecting Against Compromised Accounts in Email
sponsored by Checkpoint Software Technologies
WHITE PAPER: In a single month alone, Checkpoint HEC researchers saw 1,345 unique compromised accounts. In this whitepaper, HEC will discuss how to prevent account takeover from taking control of your business by giving you tips and strategies you can implement to improve security. Read on to learn more.
Posted: 14 May 2024 | Published: 14 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

The ultimate SASE buying guide key considerations for today’s buying teams
sponsored by Windstream Enterprise
EBOOK: This detailed SASE buying guide outlines key considerations for today's buying teams, including SASE components, market trends, benefits and the purchasing process. Learn how SASE can secure your network and workforce. Read the full guide.
Posted: 27 Jun 2024 | Published: 01 Jul 2024

Windstream Enterprise

The Ultimate Guide to Selling Managed Network Services
sponsored by Auvik Networks, Inc.
EBOOK: From selecting prospects to closing deals, discover guidance for selling managed network services in this 17-page e-book.
Posted: 14 Dec 2023 | Published: 14 Dec 2023

TOPICS:  .NET
Auvik Networks, Inc.

Top 14 Use Cases for an Enterprise Browser
sponsored by CyberArk
WHITE PAPER: Enterprise browsers are the key to securing organizations in a threat landscape where identities and attacker innovations are on the rise. This whitepaper presents the top 14 use cases security leaders can tap into to bolster their security posture.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

CyberArk

Risk management is the beating heart of your cyber strategy
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com