Standards  >  

Remote Access Protocols

RSS Feed   
ALSO CALLED: Terminal Emulation Protocols, Remote Logins
DEFINITION: Remote Desktop Protocol (RDP) is a secure network communications protocol for Windows-based applications running on a server. RDP allows network administrators to remotely diagnose and resolve problems encountered by individual subscribers. RDP is available for most versions of the Windows operating system as well as Mac OS X. An open source version is also available.Noteworthy properties of RDP include  … 

Remote Access Protocols definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Remote Access Protocols Reports
1 - 25 of 58 Matches Previous Page  |  Next Page
How Tata Consultancy Services has transformed during COVID-19
sponsored by Cisco
VIDEO: Tata Consultancy Services (TCS) is one of the world’s largest IT services organizations. To help organizations increase their agility, they’ve introduced secure borderless workspaces, a framework allowing for seamless deployment of virtual workspaces. Watch this webinar to hear from the CIO of TCS to learn the benefits of this technology.
Posted: 22 Mar 2021 | Premiered: 22 Mar 2021

Cisco

How virtual desktops simply end user computing during lockdown
sponsored by ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

From VPN to SDP
sponsored by Capcon Networks
VIDEO: Analysts estimate that the majority of businesses will phase out network VPN’s in favor of software-defined perimeters by the end of 2021. In this short video, learn how SDPs can help address critical pain points with a consolidated Zero Trust Network solution.
Posted: 16 Dec 2020 | Premiered: 16 Dec 2020

Capcon Networks

What is a Secure Remote Worker?
sponsored by Capcon Networks
VIDEO: Many are now working from home, but that doesn’t necessarily make them ‘remote’. To call an employee ‘remote’ would require them to have all the tools they need – namely, access to all their apps, in both private and public clouds, on any device, without sacrifice of performance or security. Watch this 2-minute video for more details.
Posted: 15 Dec 2020 | Premiered: 27 Nov 2020

Capcon Networks

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

Investigate Everywhere with OpenText™ EnCase™
sponsored by OpenText
WHITE PAPER: Read this white paper to see how EnCase by OpenText can help simplify modern investigations by offering comprehensive remote access to cloud, mobile and endpoint evidence for thorough review.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

OpenText

Making the Future of Work Cyber-Secure and Sustainable
sponsored by NTT
WHITE PAPER: According to a survey undertaken for NTT Ltd., 83% of organizations have had to rethink their security to accommodate new ways of working. As a result, businesses have been presented with a plethora of security challenges – but perhaps they’re opportunities to make security more distributed. Examine this white paper to learn more.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

NTT

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

CW APAC: Expert advice on zero-trust security
sponsored by ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 09 Nov 2020 | Published: 19 Nov 2020

ComputerWeekly.com

Global Threat Report
sponsored by VMware International Unlimited Company
ANALYST REPORT: 94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
Posted: 27 Oct 2020 | Published: 30 Jun 2020

VMware International Unlimited Company

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

Enduring from Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ComputerWeekly.com

Securing the Workplace of the Future
sponsored by Tehama
EBOOK: By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019

Tehama

Provide Reliable In-Home Internet Access to Every Student
sponsored by Cradlepoint
DATA SHEET: 81% of school superintendents report that the lack of in-home internet prevents them from transitioning to a full remote model. A Cradlepoint router may alleviate this issue. A solution for the home, it is simple to set up and can support up to 5 students at a time. Jump into this solution brief to see how to keep your students learning from home.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cradlepoint

EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 09 Aug 2020 | Published: 11 Aug 2020

ComputerWeekly.com

When Everything is Closed, Keep Your Business Open with Remote Access
sponsored by Aruba Networks
RESOURCE: When the unexpected happens, it doesn’t have to mean downtime for your business. In this infographic, learn how Aruba remote access solutions can help provide your business with seamless access, always-on connectivity, zero-touch provisioning, and more.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks

How Organizations Implement & Manage Working From Home
sponsored by Cradlepoint
RESOURCE: Implementing and managing the right technology to keep employees secure and productive at home challenges business leaders and IT professionals during this pandemic. Help is here: View this simple yet specific infographic that details the requirements of a secure wireless enterprise network solution.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Cradlepoint

5 Ways to Keep Remote Workers Secure and Productive
sponsored by Absolute Software Corporation
WHITE PAPER: Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Absolute Software Corporation

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications
1 - 25 of 58 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences