Standards  >  

Remote Access Protocols

RSS Feed   
ALSO CALLED: Terminal Emulation Protocols, Remote Logins
DEFINITION: Remote Desktop Protocol (RDP) is a secure network communications protocol for Windows-based applications running on a server. RDP allows network administrators to remotely diagnose and resolve problems encountered by individual subscribers. RDP is available for most versions of the Windows operating system as well as Mac OS X. An open source version is also available.Noteworthy properties of RDP include  … 

Remote Access Protocols definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Remote Access Protocols Reports
1 - 25 of 64 Matches Previous Page  |  Next Page
Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

A Unified Approach to SASE that Starts with the Digital Workspace
sponsored by Citrix
WHITE PAPER: IT departments have many challenges on their hands. They need to secure users from bad actors, and enterprise data from prying eyes, while said users are working from home or in-office, and they must provide flexible access to business and personal applications wherever they are. In this article, see how a unified approach to SASE can help.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
sponsored by Arrow & RSA
WEBCAST: Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
Posted: 23 Dec 2020 | Premiered: Aug 12, 2020

Arrow & RSA

Deliver Greater Business Value with Nutanix Solutions for End-User Computing
sponsored by Nutanix
WHITE PAPER: Download this guide to explore EUC deployment options, such as VDI vs DaaS, and guidelines for choosing and implementing an EUC platform in your organizations.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Nutanix

The Limits at the Edge: 6 Remote Network Challenges
sponsored by Tech Data - VMWare
RESOURCE: The events of early 2020 have seen organizations scrambling to quickly enable their workforces to be productive outside the corporate office. This rapid response revealed major shortcomings in user experience and put a significant strain on IT. Download this infographic to uncover 6 network challenges experienced by remote workers and IT.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Tech Data - VMWare

From VPN to SDP
sponsored by Capcon Networks
VIDEO: Analysts estimate that the majority of businesses will phase out network VPN’s in favor of software-defined perimeters by the end of 2021. In this short video, learn how SDPs can help address critical pain points with a consolidated Zero Trust Network solution.
Posted: 16 Dec 2020 | Premiered: 16 Dec 2020

Capcon Networks

What is a Secure Remote Worker?
sponsored by Capcon Networks
VIDEO: Many are now working from home, but that doesn’t necessarily make them ‘remote’. To call an employee ‘remote’ would require them to have all the tools they need – namely, access to all their apps, in both private and public clouds, on any device, without sacrifice of performance or security. Watch this 2-minute video for more details.
Posted: 15 Dec 2020 | Premiered: 27 Nov 2020

Capcon Networks

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

Investigate Everywhere with OpenText™ EnCase™
sponsored by OpenText
WHITE PAPER: Read this white paper to see how EnCase by OpenText can help simplify modern investigations by offering comprehensive remote access to cloud, mobile and endpoint evidence for thorough review.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

OpenText

Act Now: Your 5 Immediate Priorities to Secure A Hybrid Workforce
sponsored by Telstra
ANALYST REPORT: With COVID-19 restrictions easing in some parts of the world and retightening in others, businesses must navigate the technology implications for the phased approach to office-returning staff while balancing the needs of remote and hybrid employees. In this Forrester study, discover 5 key priorities for securing an emerging hybrid workforce.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

Telstra

Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Zero Trust Network Access
sponsored by VMware, Inc.
EBOOK: VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the e-book to get the full details.
Posted: 20 Nov 2020 | Published: 31 May 2019

VMware, Inc.

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

CW APAC: Expert advice on zero-trust security
sponsored by ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 09 Nov 2020 | Published: 19 Nov 2020

ComputerWeekly.com

Global Threat Report
sponsored by VMware International Unlimited Company
ANALYST REPORT: 94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
Posted: 27 Oct 2020 | Published: 30 Jun 2020

VMware International Unlimited Company

Operate From Anywhere: The Next Evolution of Remote Work
sponsored by Kingpin Comm. - 8X8
EBOOK: We’ve learned that remote work is no longer a nice-to-have perk—it is an operational pillar that enables employees to serve customers, generate revenue, reduce costs, and innovate from anywhere using any device. Stay in the game – read this essential guide for valuable insights to accelerate your organization’s shift to operate-from-anywhere.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Kingpin Comm. - 8X8

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ComputerWeekly.com

Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters
sponsored by Tehama
WHITE PAPER: Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.
Posted: 27 Aug 2020 | Published: 29 Feb 2020

Tehama

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications
1 - 25 of 64 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info