ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Security Research

  • Remote Working: How to Make the Laptop Lifestyle Flow Sweetly (and Securely) for Your Business

    Sponsored by: Kaspersky Lab

    58% of staff are motivated by the flexibility offered by working from home. Take a glimpse at this white paper released before the outbreak of COVID-19 outlining WFH benefits, trends and challenges.

  • BlackBerry AI-Powered Zero Trust

    Sponsored by: BlackBerry

    Endpoint security affects all aspects of an organization, not least when workforces are remote. To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner? This webcast presents models that organizations can use.

  • MicroScope – July 2020: MSPs lend a helping hand

    Sponsored by: MicroScope

    In this issue, read about how the Covid-19 pandemic has allowed for managed services players to show their worth, and discover how the use of collaborative tools has made businesses consider how to make conference calls more engaging

  • Dexar Group Takes on Cybersecurity

    Sponsored by: BlackBerry

    In this case study, follow the Dexar Group, a real estate and property management organization, as they partner with ForwardIT to deploy CylancePROTECT and reduce the time and effort needed to managed their nearly 450 endpoints, addressing the security needs of their remote employees and BYOD devices.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Remote Work in the Age of COVID-19

    Sponsored by: AppNeta

    The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.

  • Remote Workers

    Sponsored by: TITUS

    The workplace disruption due to COVID-19 has led to two concurrent explosions: an uptick in remote work, and an uptick in vulnerabilities and cybercrime surrounding remote work. Check out this Titus white paper to learn some strategies to keep your employees, and company, both protected and productive during these strange times.

  • 5 Questions Every CIO Must Answer in the Coronavirus Age

    Sponsored by: Hitachi Vantara

    The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).

  • Secure Transformation: Replacing Remote Access VPN with Prisma Access

    Sponsored by: Palo Alto Networks

    With the continued growth of mobile workforces and cloud-based applications, organizations are quickly finding remote access can't keep up with or secure the cloud. In this white paper, learn how to create a scalable, cloud-based infrastructure that provides secure access to all applications with Prisma Access.

  • Cyber AI for SaaS Security

    Sponsored by: AWS & DarkTrace

    In order to maintain security across todays dispersed and unpredictable workforce, organizations need to adopt a security approach that is both adaptive and grounded in behavioral understanding. Download this white paper to learn more about Darktrace’s Enterprise Immune System, which leverages artificial intelligence to protect your users.

  • 2020 Remote Workforce Cybersecurity Guide

    Sponsored by: Automox

    The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.

  • Secure Remote Access for Vendors

    Sponsored by: Hitachi Vantara

    With some of your vendors working remotely both now and for the foreseeable future, now is a good time to check up on your vendor security. Tap into this infographic for 7 steps to securing vendor access.

  • The State of Mobile Phishing

    Sponsored by: Lookout Inc.

    Each year, the mobile phishing becomes increasingly dangerous, causing disruptions across organizations of any size and in every industry. The following mobile phishing report examines the current state of these threats and explores their potential impacts as well as how to protect your organization against them. Read on to get started.

  • Solution Brief: Best Practices for Secure Mobile Access

    Sponsored by: SonicWall

    As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.

  • Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place

    Sponsored by: Forcepoint

    As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.

  • Successfully Scaling Cybersecurity for Remote Work: Protect Your People

    Sponsored by: Forcepoint

    One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.

  • Blueprint: Modern Layered Security

    Sponsored by: SonicWall

    The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.

  • Securing Remote Workers: Your Essential Guide

    Sponsored by: TechTarget

    Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download SearchSecurity's brand new guide to remote access security.

  • Securing Remote Workers: Your Essential Guide

    Sponsored by: TechTarget

    Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download SearchSecurity's brand new guide to remote access security.

  • Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative

    Sponsored by: SonicWall

    According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.

  • Data Security in today's borderless, multi-cloud landscape

    Sponsored by: Forcepoint

    While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.

  • A cybersecurity professional's guide to securing a remote workforce

    Sponsored by: Forcepoint

    Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.

  • COVID-19: Keeping Your Vulnerability Management Program on Track

    Sponsored by: Vulcan

    As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.

  • How to Improve Your Enterprise VPN Security

    Sponsored by: Vulcan

    The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.

  • Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios

    Sponsored by: Checkpoint Software Technologies

    Given current circumstances, it’s no surprise to see organizations enabling mass amounts of employees with remote access to their network. However, if done frantically, this shift can expose vulnerabilities. Download this white paper for guidance on implementing secure access for remote employees.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.