ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Protocols Research

  • Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • How virtual desktops simply end user computing during lockdown

    Sponsored by: ComputerWeekly.com

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • How virtual desktops simplify end user computing during lockdown

    Sponsored by: ComputerWeekly.com

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • Attacking And Defending A Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Remote Work Best Practices Emphasize UC Collaboration Tools

    Sponsored by: TATA Communications

    Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.

  • Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance

    Sponsored by: Citrix

    This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.

  • VDI Environments Addressing Mobile Devices in Healthcare

    Sponsored by: RES Software

    In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.

  • Enabling Seamless Remote Access to 3D Applications and Data through Virtualization

    Sponsored by: Citrix

    This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.

  • MicroScope April 2014: A special issue covering the information security market

    Sponsored by: MicroScope

    A special issue covering the opportunities for resellers selling security, and advice on the use of social media.

  • Mobilizing Windows Applications

    Sponsored by: Citrix

    This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.

  • Cisco Any Device: Planning a Productive, Secure and Competitive Future

    Sponsored by: Cisco

    Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.

  • A special issue covering the information security market

    Sponsored by: MicroScope

    A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.

  • Optimizing Microsoft® SharePoint with Dell

    Sponsored by: Dell EMC and Microsoft

    The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.

  • Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak

    Sponsored by: Silver Peak

    This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.

  • Enable an Empowered and Distributed Workforce Through Managed Remote Services

    Sponsored by: AT&T Corp

    To react quickly to customers’ needs, organizations are decentralizing their workforce and shifting them into the flow of their customers’ lives.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • Mobile Remote access services from ATT Video

    Sponsored by: AT&T Corp

    Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.

  • The Benefits of Client-Aware Cloud Computing for Mobile Users

    Sponsored by: Intel

    Mobility can be seen as both a challenge and an opportunity when it comes to client-aware cloud computing. Learn why.

  • Securing End-User Mobile Devices in the Enterprise

    Sponsored by: IBM

    As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.