ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Protocols Research

  • How Tata Consultancy Services has transformed during COVID-19

    Sponsored by: Cisco

    Tata Consultancy Services (TCS) is one of the world’s largest IT services organizations. To help organizations increase their agility, they’ve introduced secure borderless workspaces, a framework allowing for seamless deployment of virtual workspaces. Watch this webinar to hear from the CIO of TCS to learn the benefits of this technology.

  • How virtual desktops simply end user computing during lockdown

    Sponsored by: ComputerWeekly.com

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

  • From VPN to SDP

    Sponsored by: Capcon Networks

    Analysts estimate that the majority of businesses will phase out network VPN’s in favor of software-defined perimeters by the end of 2021. In this short video, learn how SDPs can help address critical pain points with a consolidated Zero Trust Network solution.

  • What is a Secure Remote Worker?

    Sponsored by: Capcon Networks

    Many are now working from home, but that doesn’t necessarily make them ‘remote’. To call an employee ‘remote’ would require them to have all the tools they need – namely, access to all their apps, in both private and public clouds, on any device, without sacrifice of performance or security. Watch this 2-minute video for more details.

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • Investigate Everywhere with OpenText™ EnCase™

    Sponsored by: OpenText

    Read this white paper to see how EnCase by OpenText can help simplify modern investigations by offering comprehensive remote access to cloud, mobile and endpoint evidence for thorough review.

  • Making the Future of Work Cyber-Secure and Sustainable

    Sponsored by: NTT

    According to a survey undertaken for NTT Ltd., 83% of organizations have had to rethink their security to accommodate new ways of working. As a result, businesses have been presented with a plethora of security challenges – but perhaps they’re opportunities to make security more distributed. Examine this white paper to learn more.

  • Attacking and Defending a Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Global Threat Report

    Sponsored by: VMware International Unlimited Company

    94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.

  • Market Guide for Zero Trust Network Access

    Sponsored by: Palo Alto Networks

    ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.

  • Cybersecurity Built for Your Business, Budget and Staff

    Sponsored by: Panda Security

    In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.

  • Learning from COVID-19: Security and Continuity Planning

    Sponsored by: Panda Security

    As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.

  • InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks

    Sponsored by: BlackBerry

    Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.

  • Enduring from Home

    Sponsored by: Malwarebytes

    2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.

  • C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security

    Sponsored by: Radware

    By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

  • Securing the Workplace of the Future

    Sponsored by: Tehama

    By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.

  • Provide Reliable In-Home Internet Access to Every Student

    Sponsored by: Cradlepoint

    81% of school superintendents report that the lack of in-home internet prevents them from transitioning to a full remote model. A Cradlepoint router may alleviate this issue. A solution for the home, it is simple to set up and can support up to 5 students at a time. Jump into this solution brief to see how to keep your students learning from home.

  • EMA Evaluation Guide to Privileged Access Management (PAM)

    Sponsored by: Remediant

    Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

  • How Organizations Implement & Manage Working From Home

    Sponsored by: Cradlepoint

    Implementing and managing the right technology to keep employees secure and productive at home challenges business leaders and IT professionals during this pandemic. Help is here: View this simple yet specific infographic that details the requirements of a secure wireless enterprise network solution.

  • 5 Ways to Keep Remote Workers Secure and Productive

    Sponsored by: Absolute Software Corporation

    Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.

  • Improving Cybersecurity for Remote Working

    Sponsored by: Mimecast

    Many organizations have found themselves in the middle of a work from home trial by fire. What are the security implications of this abrupt change? Which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?Scan this e-book for 13 key recommendations for short and long-term remote work preparation.

  • Remote Work Best Practices Emphasize UC Collaboration Tools

    Sponsored by: TATA Communications

    Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences