ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Security Research

  • Next Generation Enterprise WAN Regional WAN Deployment Guide

    Sponsored by: Cisco Systems, Inc.

    Read this white paper to discover a large-scale enterprise networking solution that supports current challenges such as app performance, virtualization, videoconferencing, security, mobility, and cloud computing.

  • Next Generation Enterprise WAN Regional WAN Overview

    Sponsored by: Cisco Systems, Inc.

    Enterprises with large-scale networking needs including remote branch-office connectivity should read this white paper to get an overview of WAN architecture that not only provides advanced routing functionality, but also allows for video collaboration, access control and secure connectivity, application performance optimization, mobility and more!

  • Next Generation Enterprise WAN Regional WAN Remote Access VPN overview

    Sponsored by: Cisco Systems, Inc.

    Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.

  • Unlocking Information: Digital data is a hospital’s most valuable resource

    Sponsored by: DellEMC and Intel®

    Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.

  • Network Evolution: Building the Infrastructure to Enable the Changing Face of IT

    Sponsored by: OnX USA LLC

    This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets.

  • How to Choose a Managed Network Services Provider

    Sponsored by: MegaPath Inc.

    Managing your network is no easy task, hence the reason managed service providers (MSPs) exist. In this resource, explore the advantages of outsourcing to an MSP and best practices for finding the right MSP for your organization.

  • Remote Access Problems: BYOD Muddies the Water

    Sponsored by: Carousel Industries

    This expert E-Guide from SearchEnterpriseWAN.com explores the challenges many organizations face when it comes to remote access and pays special attention to the security concerns BYOD brings to your enterprise.

  • Achieve Centralized Decision-Making with a Branch Network Infrastructure

    Sponsored by: NACR

    As organizations grow more distributed, centralized decision-making becomes even harder to accomplish. This E-Guide from SearchNetworking.com offers best practices for bridging the information gap to help ensure successful decision-making.

  • IT Handbook : Smartphones & Tablets in the Enterprise

    Sponsored by: TechTarget Security

    This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.

  • Simplifying branch office security

    Sponsored by: Sophos

    Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.

  • Network Evolution E-Zine: Network security in a world of mobile workers

    Sponsored by: TechTarget Networking

    In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.

  • Technical Guide on Windows Security

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • AT&T Global Network Client: Providing Secure Remote Access with the AT&T Global Network Client

    Sponsored by: AT&T Corp

    The AT&T Global Network Client provides secure remote network access anywhere, at any time.

  • Mobile Remote access services from ATT Video

    Sponsored by: AT&T Corp

    Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.

  • Expert Tips on Getting Mobile Securely with Virtual Desktops

    Sponsored by: TechTarget Security

    In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.

  • Information Security Magazine September 2011—Reader’s Choice Awards

    Sponsored by: Information Security Magazine

    Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.

  • Securing End-User Mobile Devices in the Enterprise

    Sponsored by: IBM

    As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.

  • Establishing an Effective Application Strategy for your Mobile Enterprise

    Sponsored by: IBM

    The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.

  • Field Service Mobility Best Practices

    Sponsored by: NetMotion Wireless

    Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.

  • Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration

    Sponsored by: Thawte Inc.

    Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.

  • Backup Mobile and Remote Users Securely, With or Without a VPN

    Sponsored by: Copiun

    This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.

  • Focus on Endpoint Data Protection

    Sponsored by: Druva

    Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.

  • Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success

    Sponsored by: Dell and VMware

    Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.