IT Agents  >   IT Workforce  >   Work Environment  >  

Remote Offices

RSS Feed   
Remote Offices Reports
1 - 25 of 147 Matches Previous Page  |  Next Page
How to Improve Your Enterprise VPN Security
sponsored by Vulcan
RESOURCE: The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.
Posted: 26 May 2020 | Published: 08 Apr 2020

Vulcan

Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios
sponsored by Checkpoint Software Technologies
WHITE PAPER: Given current circumstances, it’s no surprise to see organizations enabling mass amounts of employees with remote access to their network. However, if done frantically, this shift can expose vulnerabilities. Download this white paper for guidance on implementing secure access for remote employees.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Providing Comprehensive Access Control & Data Security in Multi-Cloud Environments
sponsored by Okta + Netspoke
DATA SHEET: Today’s modern, flexible workforce requires a security strategy that is equally agile. For most organizations, identity management and access control is the answer. In this data sheet, take a closer look at a specific offering from Okta & Netskope, designed to meet security and productivity needs across multi-cloud environments.
Posted: 19 May 2020 | Published: 19 May 2020

Okta + Netspoke

2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence
sponsored by Cisco Umbrella
EBOOK: As today’s workforce becomes increasingly distributed, organizations need to consider network access that goes beyond the data center. In this e-book, see where the security landscape is heading, identify the gaps in today’s security tactics, and highlight the steps you can take to protect your organization, today and tomorrow.
Posted: 19 May 2020 | Published: 19 May 2020

Cisco Umbrella

How to Provide Great Customer Experience as a Remote Workforce
sponsored by Avtex
WHITE PAPER: Working remotely doesn’t require your business to give up certain cornerstones of its brand or compromise performance. In fact, providing your customers with a great customer experience, and everything else your customers expect, is fairly simple. Check out some of these suggestions on how to remain productive and proactive as a remote workforce.
Posted: 19 May 2020 | Published: 24 Mar 2020

Avtex

Horizon with VMware Cloud on AWS
sponsored by Xtravirt
WHITE PAPER: IT teams have had to act quickly and decisively to enable remote working—but these quick-fix solutions are now under scrutiny. Your remote working capabilities must be secure, scalable, and compliant in both short-term and long-term scenarios. To see where your virtual desktops stand, take this 3-question remote working assessment by Xtravirt.
Posted: 18 May 2020 | Published: 18 May 2020

Xtravirt

Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

Combating Threats & Protecting Enterprise Data Across the Modern Workspace
sponsored by VMware International Unlimited Company
DATA SHEET: According to experts, attacks involving “island hopping”, which bypass security tactics with lateral movement within a network, are becoming increasingly troublesome. So, what can organizations do to counter this threat? This data sheet explores a potential answer. Read on to learn more.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

Best Practices for Connecting a Remote Workforce
sponsored by 8x8, Inc.
WHITE PAPER: Save a copy of this eBook to learn how to address the challenges of remote workforce management head-on. Inside, find tips on how to foster a collaborative, connected culture across your remote employees through strategies like goal setting, communication guidelines, and more.
Posted: 13 May 2020 | Published: 13 May 2020

8x8, Inc.

Synack CISO Podcast Series: Action in Unprecedented Times
sponsored by Synack
PODCAST: In this episode of the Synack CISO Podcast Series, the hosts are joined by Mike Newborn, CISO at Navy Federal Credit Union, as they discuss ensuring the safety and productivity of employees during these trying times, as well as building customer trust and the increase in malicious activity. Listen to the podcast to learn more.
Posted: 12 May 2020 | Premiered: May 12, 2020

Synack

Securing Your Remote Employees with Cloud-Based Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

Traditional Workspaces vs. Secure Digital Workspaces
sponsored by Citrix
WHITE PAPER: You’re probably familiar with the productivity benefits of remote workspaces. However, remote work options also simplify and improve digital security capabilities. Check out this resource to learn more about remote security.
Posted: 01 May 2020 | Published: 01 May 2020

Citrix

Baloise Group Uses Citrix Workspace Suite to Provide True Flexibility to Employees
sponsored by Citrix
VIDEO: The modern workforce demands, and benefits from, flexible work options that allow them to work from wherever they want. And while companies want to be able to hire and train employees wherever they are, there are often serious IT hurdles. Watch this short video to learn how the Baloise Group provided true workspace flexibility to their employees.
Posted: 01 May 2020 | Premiered: 19 Jan 2016

Citrix

Social, Productive, Adaptive: A Cohesive Approach to Remote Work
sponsored by DMI Inc
EBOOK: It’s time to think about both the short- and long-term strategies in place for remote work. DMI has proposed a new approach to mobilization strategies, based on 3 pillars: the social, the productive, and the adaptive. In this E-Book, learn how the pillars help organizations with scalability, virtual desktop infrastructure, and more.
Posted: 01 May 2020 | Published: 01 May 2020

DMI Inc

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

Enabling Secure Remote Working in Times of Crisis: Plan Ahead
sponsored by Thales
RESOURCE: As the global remote workforce continues to grow, security efforts need to be adjusted to focus on protecting distributed users and their access to critical data. This article highlights the challenges and best practices for security todays’ remote workforce. Read on to get started.
Posted: 30 Apr 2020 | Published: 19 Mar 2020

Thales

MicroScope – May 2020: Staying connected
sponsored by MicroScope
EZINE: In this issue, read about how the channel is helping customers stay connected during the pandemic, with Covid-19 raising hardware as businesses aim to provide technology for home workers. Also discover the benefits of SD-WAN and learn about the top compliance concerns for the coming year
Posted: 30 Apr 2020 | Published: 01 May 2020

MicroScope

Securing Corporate Data When Remote Working is the Norm
sponsored by Thales
RESOURCE: As companies are enabling record amounts of remote workers with access to corporate data, it is important for security team s to consider the necessary measures to take for protecting sensitive data. This article offers a list of useful tips for your teams to implement to avoid unnecessary risk. Read on to get started.
Posted: 29 Apr 2020 | Published: 07 Apr 2020

Thales

Secure the Cloud-Enabled Mobile Workforce
sponsored by Palo Alto Networks
WHITE PAPER: As organizations continue to migrate their workloads and applications to the cloud, it becomes clear that traditional remote access tools like VPNs are unable to keep pace with both threats and operational requirements. Read on to uncover a modern architecture for the mobile workforce designed to support key cloud initiatives.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Palo Alto Networks

Securely Connect Remote Workforces During the COVID-19 Outbreak
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: The recent surge in remote work trends has underlined the importance of adequate security preparations when it comes to protecting endpoints and users. This white paper overviews a few offerings from Palo Alto, and highlights the key features that position them to be helpful in supporting remote workers.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Palo Alto Networks

Digital Identity Proofing How to Verify Identities Remotely and Securely
sponsored by Entrust, Inc.
WHITE PAPER: In response to the recent surge of remote workers and online shoppers, organizations are having to take measures to ensure their environments are fit to secure the growing volume of users while maintaining experience. Read this white paper to learn more about an effective and scalable approach – identity proofing.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Entrust, Inc.
1 - 25 of 147 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info