Remote Access Security Research
-
Data Protection Solutions at Midsize Organizations
Sponsored by: Trend Micro, Inc.In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
-
Intelligence that Adapts to Your Needs
Sponsored by: IntelThe all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
-
AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm
Sponsored by: AVG Technologies USA, Inc.R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.
-
IT Decision Checklist: Remote Access
Sponsored by: VirtualArmorThe pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
-
Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
Sponsored by: Panda SecurityRead this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
-
SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions
Sponsored by: TechTarget Search Windows ServerHaving some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.
-
Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
Sponsored by: Shavlik TechnologiesThis Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
-
Lowering Risk by Applying Consistent Security Across All of Your Locations
Sponsored by: Juniper Networks, Inc.Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
-
Improving the mobile experience through solid state drive
Sponsored by: Intel CorporationIntel IT is evaluating solid-state drive (SSD) technology to better understand the benefits to users and the impacts on the enterprise. We have initiated a proof of concept (PoC) study that includes extensive benchmark testing as well as deployment of notebooks with SSDs to the Intel workforce.
-
Optimize Application Performance and Security
Sponsored by: BlueCoatBlue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.
-
Developers and Identity Services - Tackling Identity Data with Identity Hub
Sponsored by: Oracle CorporationThis paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
-
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
Sponsored by: Oracle CorporationThis paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
-
Remote Data Protection Demo
Sponsored by: IBMBackup is a pretty complex ecosystem. There's data explosion, increasing recovery demands, a shrinking backup window and a limited IT budget. In this webinar you'll hear 2 key backup experts discuss the best practices around critical success factors.
-
Small Business VoIP: The Basics
Sponsored by: Cisco Systems, Inc.Small business VoIP combines voice and data together on a single, secure network allowing your employees to stay connected with the people and data they need. The following is a guide to why you might want to consider a small business VoIP system.
-
Cisco ASA 5500 Series Adaptive Security Appliance
Sponsored by: Cisco Systems, Inc.In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
-
Cisco Secure Remote Access Solution
Sponsored by: Cisco Systems, Inc.This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
-
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
Sponsored by: Cisco Systems, Inc.This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
-
Clean VPN Approach to Secure Remote Access
Sponsored by: SonicWALLIn this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
-
Going Mobile: Developing an Application Mobilization Plan for Your Business
Sponsored by: BlackBerryThe BlackBerry Enterprise Solution is a comprehensive platform, designed to meet your organization's needs to mobilize enterprise applications and systems.
-
Developing an Effective Corporate Mobile Policy
Sponsored by: BlackBerryBy now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
-
Citrix GoToMyPCCorporate - Security White Paper
Sponsored by: Citrix Online - GotoMyPCIn this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
-
Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution
Sponsored by: Citrix Online - GotoMyPCJohns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
-
Implementing a "Smart IPS": IANS Working Knowledge Series
Sponsored by: SourcefireThe LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
-
Wholesale Grocer uses CONNX for Data Access, Data Integration and to Enhance Reporting Capabilities
Sponsored by: CONNX SolutionsExplore how a data access and integration solution saved one of North America's oldest wholesale grocers from replacing its ten year old distribution system and spending up to five million dollars on a brand new enterprise solution.
-
Increase Productivity and Reduce Security Risks for Teleworkers
Sponsored by: SonicWALLThis paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.