IT Management  >   Systems Operations  >   Network Management  >   Remote Network Management  >  

Remote Office Connectivity

RSS Feed   
DEFINITION: The ability to provide applications to remote offices.
Remote Office Connectivity Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
Making Remote Work: How Elastic Hires and Onboards New Employees
sponsored by HackerRank
RESOURCE: For search engine company, Elastic, who has worked as a completely distributed organization since they were founded, remote work is nothing new. HackerRank recently sat down with a senior technical recruiter for the company to understand how they’ve been able to make remote work for their team. Explore the key takeaways in this blog post.
Posted: 05 Jun 2020 | Published: 05 Jun 2020

HackerRank

The State of Mobile Phishing
sponsored by Lookout Inc.
WHITE PAPER: Each year, the mobile phishing becomes increasingly dangerous, causing disruptions across organizations of any size and in every industry. The following mobile phishing report examines the current state of these threats and explores their potential impacts as well as how to protect your organization against them. Read on to get started.
Posted: 05 Jun 2020 | Published: 13 May 2020

Lookout Inc.

Solution Brief: Best Practices for Secure Mobile Access
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Forcepoint
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

MicroScope – June 2020: The surge in home working
sponsored by MicroScope
EZINE: The shift by many to home working has created opportunities and challenges for the channel as it looks to help customers through the changes. Also discover the importance of diversity in your workforce, and how Covid-19 is affecting IT events
Posted: 03 Jun 2020 | Published: 05 Jun 2020

MicroScope

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Blueprint: Modern Layered Security
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

Data Security in today's borderless, multi-cloud landscape
sponsored by Forcepoint
WHITE PAPER: While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

A cybersecurity professional's guide to securing a remote workforce
sponsored by Forcepoint
EBOOK: Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.
Posted: 28 May 2020 | Published: 28 May 2020

Forcepoint

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

How to Improve Your Enterprise VPN Security
sponsored by Vulcan
RESOURCE: The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.
Posted: 26 May 2020 | Published: 08 Apr 2020

Vulcan

Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios
sponsored by Checkpoint Software Technologies
WHITE PAPER: Given current circumstances, it’s no surprise to see organizations enabling mass amounts of employees with remote access to their network. However, if done frantically, this shift can expose vulnerabilities. Download this white paper for guidance on implementing secure access for remote employees.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Providing Comprehensive Access Control & Data Security in Multi-Cloud Environments
sponsored by Okta + Netspoke
DATA SHEET: Today’s modern, flexible workforce requires a security strategy that is equally agile. For most organizations, identity management and access control is the answer. In this data sheet, take a closer look at a specific offering from Okta & Netskope, designed to meet security and productivity needs across multi-cloud environments.
Posted: 19 May 2020 | Published: 19 May 2020

Okta + Netspoke

2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence
sponsored by Cisco Umbrella
EBOOK: As today’s workforce becomes increasingly distributed, organizations need to consider network access that goes beyond the data center. In this e-book, see where the security landscape is heading, identify the gaps in today’s security tactics, and highlight the steps you can take to protect your organization, today and tomorrow.
Posted: 19 May 2020 | Published: 19 May 2020

Cisco Umbrella

Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

Combating Threats & Protecting Enterprise Data Across the Modern Workspace
sponsored by VMware International Unlimited Company
DATA SHEET: According to experts, attacks involving “island hopping”, which bypass security tactics with lateral movement within a network, are becoming increasingly troublesome. So, what can organizations do to counter this threat? This data sheet explores a potential answer. Read on to learn more.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

Synack CISO Podcast Series: Action in Unprecedented Times
sponsored by Synack
PODCAST: In this episode of the Synack CISO Podcast Series, the hosts are joined by Mike Newborn, CISO at Navy Federal Credit Union, as they discuss ensuring the safety and productivity of employees during these trying times, as well as building customer trust and the increase in malicious activity. Listen to the podcast to learn more.
Posted: 12 May 2020 | Premiered: May 12, 2020

Synack

Securing Your Remote Employees with Cloud-Based Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

Baloise Group Uses Citrix Workspace Suite to Provide True Flexibility to Employees
sponsored by Citrix
VIDEO: The modern workforce demands, and benefits from, flexible work options that allow them to work from wherever they want. And while companies want to be able to hire and train employees wherever they are, there are often serious IT hurdles. Watch this short video to learn how the Baloise Group provided true workspace flexibility to their employees.
Posted: 01 May 2020 | Premiered: 19 Jan 2016

Citrix

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info