Standards  >  

Remote Access Protocols

RSS Feed   
ALSO CALLED: Terminal Emulation Protocols, Remote Logins
DEFINITION: Remote Desktop Protocol (RDP) is a secure network communications protocol for Windows-based applications running on a server. RDP allows network administrators to remotely diagnose and resolve problems encountered by individual subscribers. RDP is available for most versions of the Windows operating system as well as Mac OS X. An open source version is also available.Noteworthy properties of RDP include  … 

Remote Access Protocols definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Remote Access Protocols Reports
1 - 25 of 63 Matches Previous Page  |  Next Page
Operate From Anywhere: The Next Evolution of Remote Work
sponsored by Kingpin Comm. - 8X8
EBOOK: We’ve learned that remote work is no longer a nice-to-have perk—it is an operational pillar that enables employees to serve customers, generate revenue, reduce costs, and innovate from anywhere using any device. Stay in the game – read this essential guide for valuable insights to accelerate your organization’s shift to operate-from-anywhere.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Kingpin Comm. - 8X8

Tackling Cyber Threats in a Newly Distributed Workforce
sponsored by IntelliGO
WHITE PAPER: As organizations scramble to deal with the logistical kinks that come from hastily enabling a newly remote workforce, their IT teams must remain vigilant and flexible when it comes to securing tech assets amid changing circumstances. How can you make sure you’re staying on top of threats? Read this white paper to learn where to start.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

IntelliGO

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Decade of the Rats
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

Prisma Access BP Webinar
sponsored by Palo Alto Networks
WEBCAST: Due to COVID-19, the notion of remote access has evolved and expanded to allow students to remotely connect to classes, doctors to securely connect to their patients and remote workers to connect to the applications and resources they need. In this webcast, learn more about how secure remote access is evolving and how a SASE approach can help.
Posted: 14 Oct 2020 | Premiered: Oct 14, 2020

Palo Alto Networks

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

Secure, Connected Digital Workplace
sponsored by TATA Communications
WHITE PAPER: The world of IT has undergone more transformation in the past six months than many could have predicted, but that doesn’t mean that organizations will be smooth-sailing when the pandemic is over. Businesses must continue to plan for the unexpected. Read this white paper to understand what to prioritize when it comes to post-COVID operations.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

TATA Communications

Securing the Digital Workplace
sponsored by TATA Communications
DATA SHEET: Organizations are searching for ways to ensure secure remote access for identity, devices, apps, data and networks. The security perimeter has changed, and there are still many complex challenges that organizations need to overcome. Take control – view this data sheet to see how Tata Communications may be able to assist.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

TATA Communications

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Enduring from Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ComputerWeekly.com

Remote Education: Prepping for the Long Game
sponsored by Comcast Business
RESOURCE: According to the UN, more than 850 million students worldwide have been forced out of the classroom due to COVID-19, and many can no longer participate in school as a result. Action must be taken to ensure that students will be back in the classroom, virtually or not. Read this blog to learn how to prepare your network for the future of learning.
Posted: 11 Sep 2020 | Published: 20 May 2020

Comcast Business

Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters
sponsored by Tehama
WHITE PAPER: Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.
Posted: 27 Aug 2020 | Published: 29 Feb 2020

Tehama

Onboarding Third-Party IT Service Providers Doesn’t Have to be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: According to Gartner, the biggest challenge Chief Procurement Officers (CPOs) face is the time it takes to securely onboard outside organizations and vendors into their information systems and business apps. Read this white paper to learn the risks and challenges when hiring third-party IT service providers or providing remote network access.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Tehama

Securing the Workplace of the Future
sponsored by Tehama
EBOOK: By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019

Tehama

Provide Reliable In-Home Internet Access to Every Student
sponsored by CradlePoint
DATA SHEET: 81% of school superintendents report that the lack of in-home internet prevents them from transitioning to a full remote model. A Cradlepoint router may alleviate this issue. A solution for the home, it is simple to set up and can support up to 5 students at a time. Jump into this solution brief to see how to keep your students learning from home.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

CradlePoint

How IT Security is Adapting to the Changing Environment in 2020
sponsored by Cisco Umbrella
WEBCAST: With COVID-19 upon the world, IT security professionals are asking: What are the main challenges organizations are facing? What are some of the trends in the security market today? How can businesses adapt to stay secure now that employees and customers are working from home? Watch this webcast for a look at answers to these questions.
Posted: 18 Aug 2020 | Premiered: Apr 21, 2020

Cisco Umbrella

TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.
Posted: 18 Aug 2020 | Published: 20 Jun 2020

CyberArk Software, Inc

Decade of the RATs
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report as well as different types of remote access trojans (RATs) and what they look like.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

BlackBerry

EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 09 Aug 2020 | Published: 11 Aug 2020

ComputerWeekly.com

When Everything is Closed, Keep Your Business Open with Remote Access
sponsored by Aruba Networks
RESOURCE: When the unexpected happens, it doesn’t have to mean downtime for your business. In this infographic, learn how Aruba remote access solutions can help provide your business with seamless access, always-on connectivity, zero-touch provisioning, and more.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks
1 - 25 of 63 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info