ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Protocols Research

  • E-Book: Strategic guide to insider threat detection and breach response

    Sponsored by: SearchSecurity.com

    Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.

  • Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance

    Sponsored by: Citrix

    This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.

  • VDI Environments Addressing Mobile Devices in Healthcare

    Sponsored by: RES Software

    In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.

  • Enabling Seamless Remote Access to 3D Applications and Data through Virtualization

    Sponsored by: Citrix

    This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.

  • MicroScope April 2014: A special issue covering the information security market

    Sponsored by: MicroScope

    A special issue covering the opportunities for resellers selling security, and advice on the use of social media.

  • Mobilizing Windows Applications

    Sponsored by: Citrix

    This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.

  • Cisco Any Device: Planning a Productive, Secure and Competitive Future

    Sponsored by: Cisco

    Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.

  • A special issue covering the information security market

    Sponsored by: MicroScope

    A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.

  • Optimizing Microsoft® SharePoint with Dell

    Sponsored by: Dell EMC and Microsoft

    The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.

  • Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak

    Sponsored by: Silver Peak

    This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.

  • Enable an Empowered and Distributed Workforce Through Managed Remote Services

    Sponsored by: AT&T Corp

    To react quickly to customers’ needs, organizations are decentralizing their workforce and shifting them into the flow of their customers’ lives.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • Mobile Remote access services from ATT Video

    Sponsored by: AT&T Corp

    Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.

  • The Benefits of Client-Aware Cloud Computing for Mobile Users

    Sponsored by: Intel

    Mobility can be seen as both a challenge and an opportunity when it comes to client-aware cloud computing. Learn why.

  • Securing End-User Mobile Devices in the Enterprise

    Sponsored by: IBM

    As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.

  • Establishing an Effective Application Strategy for your Mobile Enterprise

    Sponsored by: IBM

    The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.

  • Field Service Mobility Best Practices

    Sponsored by: NetMotion Wireless

    Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.

  • Ericom Blaze — RDP Acceleration

    Sponsored by: Ericom Software

    Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.

  • 9 Advantages to Using Remote Support Tools for an IT Support Company/Consultant

    Sponsored by: GFI Software

    With the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support.

  • Presentation Transcript: VDI in Branch Offices

    Sponsored by: Virtual Bridges

    This transcript of the video "Using VDI at a Branch Office" , featuring desktop virtualization experts Brian Madden and Gabe Knuth, provides guidelines for extending central management to remote locations.

  • SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions

    Sponsored by: SearchWinIT

    Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.

  • Windows PowerShell 2.0

    Sponsored by: Microsoft

    Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended.

  • Optimize Application Performance and Security

    Sponsored by: BlueCoat

    Blue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.

  • Remote Data Protection Demo

    Sponsored by: IBM

    Backup is a pretty complex ecosystem. There's data explosion, increasing recovery demands, a shrinking backup window and a limited IT budget. In this webinar you'll hear 2 key backup experts discuss the best practices around critical success factors.

  • Ericom Desktop Virtualization Solutions

    Sponsored by: Ericom Software

    Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.