Standards  >   Remote Access Protocols  >   Telnet Protocol  >  

Tn3270

RSS Feed   
DEFINITION: A variant of the Telnet program that allows one to attach to IBM mainframes and use the mainframe as if you had a 3270 or similar terminal.
Tn3270 Reports
1 - 25 of 88 Matches Previous Page  |  Next Page
11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

A Unified Approach to SASE that Starts with the Digital Workspace
sponsored by Citrix
WHITE PAPER: IT departments have many challenges on their hands. They need to secure users from bad actors, and enterprise data from prying eyes, while said users are working from home or in-office, and they must provide flexible access to business and personal applications wherever they are. In this article, see how a unified approach to SASE can help.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

Act Now: Your 5 Immediate Priorities to Secure A Hybrid Workforce
sponsored by Telstra
ANALYST REPORT: With COVID-19 restrictions easing in some parts of the world and retightening in others, businesses must navigate the technology implications for the phased approach to office-returning staff while balancing the needs of remote and hybrid employees. In this Forrester study, discover 5 key priorities for securing an emerging hybrid workforce.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

Telstra

Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
sponsored by Arrow & RSA
WEBCAST: Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
Posted: 23 Dec 2020 | Premiered: Aug 12, 2020

Arrow & RSA

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Best Practices for CIOs to Ensure Business Continuity During This Pandemic
sponsored by Cloudflare
WEBCAST: During this COVID-19 crisis, every CIO’s key goal is to maintain business continuity — enable all employees, customers, partners, and vendors to continue working and collaborating seamlessly. In this webcast, explore the key essentials to ensure business and IT continuity during this crisis.
Posted: 08 May 2020 | Premiered: May 8, 2020

Cloudflare

C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

Cisco Umbrella and Ford Motor Company Coffee Hour
sponsored by Cisco Umbrella
VIDEO: With the unprecedented shift to remote work, organizations needed to quickly enable access to critical applications everywhere without compromising network performance or security protection. Pause and take in this Cisco webcast to learn how Ford Motor Company CISO Patrick Milligan secures 108,000 remote workers.
Posted: 04 Dec 2020 | Premiered: 10 Nov 2020

Cisco Umbrella

Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 09 Aug 2020 | Published: 11 Aug 2020

ComputerWeekly.com

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ComputerWeekly.com

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

COVID-19: Restarting the UK Through Technology
sponsored by RingCentral
ANALYST REPORT: The world may be at a standstill, but in the UK technology has seldom moved faster. Demand for cloud systems is rising during the pandemic, and as the country gradually emerges from its isolation, organizations will need guidance.Read this report from RingCentral for a glimpse at the effects of COVID-19 in the UK and an outlook on the future.
Posted: 01 Jul 2020 | Published: 30 Jun 2020

RingCentral

CW APAC: Expert advice on zero-trust security
sponsored by ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 09 Nov 2020 | Published: 19 Nov 2020

ComputerWeekly.com

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

9 Advantages to Using Remote Support Tools for an IT Support Company/Consultant
sponsored by GFI Software
WHITE PAPER: With the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support.
Posted: 22 Dec 2010 | Published: 22 Dec 2010

GFI Software

A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.
Posted: 03 May 2013 | Published: 07 May 2013

MicroScope

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak
sponsored by Silver Peak
CASE STUDY: This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Silver Peak
1 - 25 of 88 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info