IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Remote Access Management

RSS Feed   
Remote Access Management Reports
 
Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution
sponsored by Citrix Online - GotoMyPC
CASE STUDY: Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
Posted: 19 Jun 2008 | Published: 01 Jan 2004

Citrix Online - GotoMyPC

The Distributed Enterprise
sponsored by Raritan Inc.
WHITE PAPER: This paper addresses the added value (in terms of uptime and security) of out-of-band access and control tools for branch offices, and why out-of-band should be considered as a component of branch office networks.
Posted: 18 Jan 2008 | Published: 01 Jan 2007

Raritan Inc.

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

Seven Strategies for Effective Desktop Management
sponsored by WebEx Communications, Inc.
WEBCAST: Remote and local desktop support is an increasingly difficult and expensive task for IT staffs. Listen to this Webcast to gain seven strategies for effective desktop management so your organization can immediately manage, protect and secure its PC assets
Posted: 01 Mar 2007 | Premiered: Feb 27, 2007

WebEx Communications, Inc.

Remote Data Protection Demo
sponsored by IBM
SOFTWARE DEMO: Backup is a pretty complex ecosystem. There's data explosion, increasing recovery demands, a shrinking backup window and a limited IT budget. In this webinar you'll hear 2 key backup experts discuss the best practices around critical success factors.
Posted: 31 Oct 2008 | Premiered: 30 Oct 2008

IBM

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation

Next Generation Enterprise WAN Regional WAN Remote Access VPN overview
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement