ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Security Research

  • Business Continuity – Are You Putting Your Company at Risk with RDP?

    Sponsored by: PortSys

    RDP has been a favorite target of hackers for a long time, even before this pandemic. Many organizations may think that their default RDP security methods are good enough. But most RDP deployments don’t even incorporate fundamental security features such as 2FA. Learn how Total Access Control (TAC) can keep users more secure in this WFH world.

  • Securing your Remote Workforce

    Sponsored by: Malwarebytes

    To address today’s realities, organizations must plan for and deploy strategies to support remote worker cyber resilience. In this live webinar recording, Greg Higham CIO of Malwarebytes shares best practices for a secure remote workforce. Listen now for his insights.

  • Extending Secure Access to Remote Workers

    Sponsored by: Barracuda

    These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.

  • Remote Work Considerations: Securing the New Corporate Network

    Sponsored by: EvolveIP

    Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    Sponsored by: Barracuda

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

  • Secure Mobility for Remote Workers

    Sponsored by: Lookout Inc.

    Organizational culture is shifting to enable distributed workforces. However, there are significant challenges to consider when it comes to securing remote users and devices. In this case study, explore the key features of Lookout various services and discover if the capabilities are a good fit for your remote worker security needs.

  • Computer Weekly - 31 March 2020: Can the internet take the strain?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.

  • Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

  • Intelligent Cloud Identity Platform

    Sponsored by: SailPoint Technologies

    Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.

  • 5 Essential Elements of a Comprehensive Endpoint Security Strategy

    Sponsored by: CyberArk Software, Inc

    Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.

  • The Spectrum of Mobile Risk: The Full Range of Risks to Enterprise Data

    Sponsored by: Lookout Inc.

    Risk management tactics needs to evolve to address mobile devices and the risks that threaten them. To encourage this evolution, Lookout developed the Mobile Risk Matrix to help organizations better understand the various mobile device risk and how to address them. Read on to unlock the Matrix.

  • The Essential Guide to Secure Web Gateways

    Sponsored by: AT&T Cybersecurity

    Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.

  • Buyer’s Guide to Choosing the Right Remote Support Tool

    Sponsored by: LogMeIn Rescue

    Choosing the best remote support tool can be a challenge, especially as user expectations grow and systems become more complex and offer more options and features. Download this buyer’s guide to help you select the best remote support tool for your organization.

  • Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way

    Sponsored by: Malwarebytes

    This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.

  • Cisco Umbrella & Duo Security: Protect users and secure access to applications

    Sponsored by: Cisco Umbrella

    As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.

  • Total Access Control Provides Zero Trust Application Access for Financial Services Firm

    Sponsored by: PortSys

    In this case study, a PortSys customer explains how they needed to make an important decision when Microsoft announced it was ending support for its Unified Access Gateway (UAG). Read on to find out why the team went with Total Access Control (TAC) from PortSys for secure remote access.

  • Oklahoma Municipal Power Authority Energizes Team’s Secure Remote Access with TAC

    Sponsored by: PortSys

    The Oklahoma Municipal Power Authority (OMPA) provides electrical power and energy to Oklahoma’s municipally owned electric systems. But the energy sector’s infrastructure provides an alluring target for cybercriminals. In this case study, learn how OMPA turned to Total Access Control for secure remote access.

  • Guide to Flexible Working

    Sponsored by: ComputerWeekly.com

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

  • New Options to Enable Remote Access in the Network

    Sponsored by: SearchNetworking.com

    This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.

  • Compare desktop virtualization options: DaaS vs. VDI

    Sponsored by: Citrix

    It can be difficult to compare VDI vs. DaaS when determining which, if either is right for your organization. In this e-guide gain an understanding of the different capabilities each delivery method offers, and find use cases for each.

  • Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management

    Sponsored by: Check Point Software Technologies Ltd.

    Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.

  • Why Laptop Security Cannot Wait

    Sponsored by: Commvault

    This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.

  • Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance

    Sponsored by: Citrix

    This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.

  • Endpoint protection: Whitelisting and Beyond

    Sponsored by: SearchSecurity.com

    Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.

  • Enabling Seamless Remote Access to 3D Applications and Data through Virtualization

    Sponsored by: Citrix

    This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.