Standards  >  

Remote Access Protocols

RSS Feed   
ALSO CALLED: Terminal Emulation Protocols, Remote Logins
DEFINITION: Remote Desktop Protocol (RDP) is a secure network communications protocol for Windows-based applications running on a server. RDP allows network administrators to remotely diagnose and resolve problems encountered by individual subscribers. RDP is available for most versions of the Windows operating system as well as Mac OS X. An open source version is also available.Noteworthy properties of RDP include  … 

Remote Access Protocols definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Remote Access Protocols Reports
1 - 25 of 36 Matches Previous Page  |  Next Page
BlackBerry AI Powered Zero Trust
sponsored by BlackBerry
WEBCAST: Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

BlackBerry

COVID-19: Restarting the UK Through Technology
sponsored by RingCentral
ANALYST REPORT: The world may be at a standstill, but in the UK technology has seldom moved faster. Demand for cloud systems is rising during the pandemic, and as the country gradually emerges from its isolation, organizations will need guidance.Read this report from RingCentral for a glimpse at the effects of COVID-19 in the UK and an outlook on the future.
Posted: 01 Jul 2020 | Published: 30 Jun 2020

RingCentral

The New Workplace: Re-Imagining Work After 2020
sponsored by Okta
ANALYST REPORT: For this report, 6,000 office workers across the UK, Germany, France and the Netherlands were surveyed. The questions revolved around their readiness to work from home, their employers’ remote security, and the change in culture that comes with working remotely.Read on to see how their perceptions compare to your own.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Okta

Osterman Research: Focusing on the Endpoint as a Key Element of Your Security Infrastructure
sponsored by Trend Micro
WHITE PAPER: In the past, endpoints sat behind a network perimeter, but the growth of remote access to corporate resources makes the endpoint the new perimeter. Phishing, ransomware, malware, and web downloads are all potential threats. Delve into this Osterman Research report to get an in-depth look at these threats and how you can protect against them.
Posted: 26 Jun 2020 | Published: 30 Apr 2020

Trend Micro

Secure Remote Access Readiness: Podcast
sponsored by Pulse Secure
PODCAST: Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Pulse Secure

Remote Workers
sponsored by TITUS
WHITE PAPER: The workplace disruption due to COVID-19 has led to two concurrent explosions: an uptick in remote work, and an uptick in vulnerabilities and cybercrime surrounding remote work. Check out this Titus white paper to learn some strategies to keep your employees, and company, both protected and productive during these strange times.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

TITUS

Remote Access Solution Guide
sponsored by Extreme Networks
DATA SHEET: More now than ever, modern-day problems require modern-day solutions. This is especially true for supporting remote workers. In this solution brief, learn how Extreme Networks can help support remote branches, teleworkers and distance learners with their multiple hardware and software-based solutions.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

Extreme Networks

Best Practices for CIOs to Ensure Business Continuity During This Pandemic
sponsored by Cloudflare
WEBCAST: During this COVID-19 crisis, every CIO’s key goal is to maintain business continuity — enable all employees, customers, partners, and vendors to continue working and collaborating seamlessly. In this webcast, explore the key essentials to ensure business and IT continuity during this crisis.
Posted: 08 May 2020 | Premiered: May 8, 2020

Cloudflare

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

Omdia Market Radar: Zero-Trust Access
sponsored by Cloudflare
WHITE PAPER: Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.
Posted: 04 May 2020 | Published: 17 Mar 2020

Cloudflare

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix

VDI Environments Addressing Mobile Devices in Healthcare
sponsored by RES Software
EGUIDE: In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

RES Software

Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 23 May 2014 | Published: 03 Mar 2014

Citrix

MicroScope April 2014: A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling security, and advice on the use of social media.
Posted: 11 Apr 2014 | Published: 14 Apr 2014

MicroScope

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.
Posted: 03 May 2013 | Published: 07 May 2013

MicroScope

Optimizing Microsoft® SharePoint with Dell
sponsored by Dell EMC and Microsoft
WHITE PAPER: The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell EMC and Microsoft

Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak
sponsored by Silver Peak
CASE STUDY: This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Silver Peak

Enable an Empowered and Distributed Workforce Through Managed Remote Services
sponsored by AT&T Corp
WHITE PAPER: To react quickly to customers’ needs, organizations are decentralizing their workforce and shifting them into the flow of their customers’ lives.
Posted: 27 Oct 2011 | Published: 27 Oct 2011

AT&T Corp

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

The Benefits of Client-Aware Cloud Computing for Mobile Users
sponsored by Intel
VIDEO: Mobility can be seen as both a challenge and an opportunity when it comes to client-aware cloud computing. Learn why.
Posted: 17 Aug 2011 | Premiered: 16 Aug 2011

Intel

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM
1 - 25 of 36 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info