IT Management  >   Systems Operations  >   Network Management  >  

Remote Network Management

RSS Feed   
ALSO CALLED: Remote Network Monitoring Management, Remote Management
DEFINITION: A sensor network is a group of specialized transducers with a communications infrastructure intended to monitor and record conditions at diverse locations. Commonly monitored parameters are temperature, humidity, pressure, wind direction and speed, illumination intensity, vibration intensity, sound intensity, power-line voltage, chemical concentrations, pollutant levels and vital body functions.A sensor  … 

Remote Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary
Remote Network Management Reports
1 - 25 of 187 Matches Previous Page  |  Next Page
COVID-19: Why Businesses Need to Revisit Their Corporate DNA
sponsored by Telstra
WHITE PAPER: COVID-19 has exposed significant vulnerabilities in organizational culture, supply chains and technology platforms across all market sectors as well as challenged assumptions about workstyles and operating models. How can organizations aptly respond? Read this white paper to get a clearer picture of what needs to change and how UCC can help.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Telstra

Sixgill Report: Remote Desktop Protocol (RDP)
sponsored by Sixgill
PRODUCT OVERVIEW: Compromised remote desktop protocols (RDPs) are a goldmine for ransomware actors looking to make a quick buck during the pandemic. This report provides a closer look at the threat facing RDPs and how organizations can protect their remote workers – read on to get started.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Sixgill

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Moving from a “Crisis Approach” to an Everyday Plan for Remote Work
sponsored by Citrix
RESOURCE: At the beginning of the pandemic, IT's response to remote work was a crisis approach. However, it's now time to move from a crisis approach to an everyday operational model. In this resource, discover how IT can align remote-work needs for everyday business using a comprehensive digital workspace automation platform.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Citrix

CW APAC: Expert advice on zero-trust security
sponsored by ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 09 Nov 2020 | Published: 19 Nov 2020

ComputerWeekly.com

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications

Integrate GoTo with Microsoft Teams to Supercharge Your Online Collaboration and Communication
sponsored by LogMeIn, Inc.
DATA SHEET: Organizations are using Microsoft Teams to securely engage and communicate – especially across email, chat, and messaging services. In this data sheet, you’ll learn how Teams integrates with GoTo’s cloud-telephony, high-quality audio and videoconferencing. View now to learn 3 reasons to integrate GoTo with Teams.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

LogMeIn, Inc.

GoTo: The Modern Unified Communications Solution for School Districts
sponsored by LogMeIn, Inc.
EBOOK: Education is in fight-back mode. School districts are searching for communication solutions to seamlessly and securely connect remote students with faculty to continue to push learning forward. By viewing this e-book, you can learn how a leading communications and collaboration provider is playing its part in educational continuity.
Posted: 05 Nov 2020 | Published: 13 Jul 2020

LogMeIn, Inc.

RMM & Patch Management: The First Line of Defense Against Cyberthreats
sponsored by Datto, Inc.
DATA SHEET: Given high-profile attacks like WannaCry, MSPs are often the ones looked to for providing tactical measures to secure their clients’ IT environments. Dig into this paper to view guidance on getting started with patch management and RMM services to help you as an MSP in this endeavor.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Datto, Inc.

Telstra Workplace Collaboration Report 2020
sponsored by Telstra
WHITE PAPER: 2020 has been an unprecedented year for businesses, teams and collaboration with the mass shift to remote work. This change provides an opportunity for professionals to learn about workplace collaboration and shape its future in new ways. In this white paper, read how you can improve remote collaboration for the future of work.
Posted: 04 Nov 2020 | Published: 04 Nov 2020

Telstra

7 Best Practices for Enabling & Securing Remote Work
sponsored by CyberArk Software, Inc
EBOOK: In order to achieve flexibility, remote workers are using unmanaged personal devices to conduct work. However, with this increased flexibility comes new securitychallenges that require modern solutions. This eBook highlight these challenges and offers 7 best practices for enabling and securing remote work – read on to get started.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CyberArk Software, Inc

David’s Bridal Leverages LTE Failover for Branch Continuity in Hundreds of Stores
sponsored by CradlePoint
CASE STUDY: David’s Bridal stores were connected to the corporate network via T-1 lines backed up with wireless failover. Their needs were met, but IT needed to modernize the network backup system to add more capabilities and features, and to take advantage of LTE. View this case study to learn how CradlePoint was able to provide these services.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

CradlePoint

Remote Work & the IAM Market
sponsored by BIO-key International
EGUIDE: As remote workforces increase in size, so too does the need to effectively manage and provision user access to critical data, applications and devices. In this e-guide, discover how the remote work boom has changed the identity and access management (IAM) market.
Posted: 27 Oct 2020 | Published: 23 Oct 2020

BIO-key International

Global Threat Report
sponsored by VMware International Unlimited Company
ANALYST REPORT: 94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
Posted: 27 Oct 2020 | Published: 30 Jun 2020

VMware International Unlimited Company

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

Operate From Anywhere: The Next Evolution of Remote Work
sponsored by Kingpin Comm. - 8X8
EBOOK: We’ve learned that remote work is no longer a nice-to-have perk—it is an operational pillar that enables employees to serve customers, generate revenue, reduce costs, and innovate from anywhere using any device. Stay in the game – read this essential guide for valuable insights to accelerate your organization’s shift to operate-from-anywhere.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Kingpin Comm. - 8X8

Tackling Cyber Threats in a Newly Distributed Workforce
sponsored by IntelliGO
WHITE PAPER: As organizations scramble to deal with the logistical kinks that come from hastily enabling a newly remote workforce, their IT teams must remain vigilant and flexible when it comes to securing tech assets amid changing circumstances. How can you make sure you’re staying on top of threats? Read this white paper to learn where to start.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

IntelliGO

Open for Business: Enabling True Collaboration Without Compromise
sponsored by Kingpin Comm. - 8X8
EBOOK: As network professionals know, the greatest inhibitor of productivity is complexity. With commerce, talent acquisition and now work all living online, organizations need a platform can support all of their communications efforts through just one vendor. Jump into this e-book to get a glimpse at what all-in-one communications can do.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Kingpin Comm. - 8X8

Cybersecurity in the Remote Work Era: A Global Risk Report
sponsored by Keeper Security Inc
WHITE PAPER: One of the business functions most affected by the spread of COVID-19 and the subsequent era of remote work is IT security. Read this comprehensive research report, Cybersecurity in the Remote Work Era: A Global Risk Report, for a closer look at the new risks to look out for, how security postures have changed, and other key findings.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Keeper Security Inc

Cloud Adoption and Risk Report
sponsored by McAfee
WHITE PAPER: The spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

McAfee

The Future of Work is Here
sponsored by Dropbox
WEBCAST: In this webcast from Dropbox and Forrester, experts discuss findings from their recent research on the remote work experience including what industries it works best for, preferences for WFH, 5 ways to support the remote workforce, and much more.
Posted: 19 Oct 2020 | Premiered: Oct 19, 2020

Dropbox

Decade of the Rats
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

How to Enhance Cybersecurity as Your Office Reopens
sponsored by Keeper Security Inc
RESOURCE: No matter when the world will be ready to return the office, it’s never a bad idea to evaluate (or reevaluate) cybersecurity in your organization. Everything from device management to training to policies should be carefully scrutinized. Need help getting started? Check out this infographic for 5 ways to enhance cybersecurity.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

Don’t Compromise on Security in a Crisis
sponsored by BlackBerry
WHITE PAPER: As organizations encourage their employees to work from home as a measure of personal health and safety, criminals are looking to take advantage of the transition period as an entry point for their cyberthreats. In this white paper, discover how to achieve effective remote worker security that doesn’t sacrifice efficacy.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry
1 - 25 of 187 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info