ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Security Multimedia

  • Increase in Remote Workers Demands a New Standard of Identity

    Sponsored by: Okta

    In this episode of the Future of Work webinar series, Eileen Jennings-Brown, Head of Technology at Wellcome Trust, discusses how her organization prepared for remote working and how her team is preparing for further disruption in the future.

  • The New & Next Normal

    Sponsored by: Poly

    53.9% of organizations in EMEA report that remote management is the toughest challenge of employees working remote, with security close behind at 52.9%. How have organizations embraced the new normal, and what’s in store for the future? Watch this webcast for an in-depth look at remote work trends and what companies can do to further transform.

  • Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal

    Sponsored by: Itergy

    After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.

  • How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work

    Sponsored by: Okta

    While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.

  • From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce

    Sponsored by: Okta

    Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.

  • BlackBerry AI-Powered Zero Trust

    Sponsored by: BlackBerry

    Endpoint security affects all aspects of an organization, not least when workforces are remote. To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner? This webcast presents models that organizations can use.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Secure Remote Access Readiness: Podcast

    Sponsored by: Pulse Secure

    Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.

  • Secure Remote Access Readiness: Webinar

    Sponsored by: Pulse Secure

    Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.

  • Best Practices for CIOs to Ensure Business Continuity During This Pandemic

    Sponsored by: Cloudflare

    During this COVID-19 crisis, every CIO’s key goal is to maintain business continuity — enable all employees, customers, partners, and vendors to continue working and collaborating seamlessly. In this webcast, explore the key essentials to ensure business and IT continuity during this crisis.

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • Securing Your Business During the COVID-19 Crisis

    Sponsored by: Barracuda

    Like you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.

  • Securing your Remote Workforce

    Sponsored by: Malwarebytes

    To address today’s realities, organizations must plan for and deploy strategies to support remote worker cyber resilience. In this live webinar recording, Greg Higham CIO of Malwarebytes shares best practices for a secure remote workforce. Listen now for his insights.

  • Extending Secure Access to Remote Workers

    Sponsored by: Barracuda

    These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • Mobile Remote access services from ATT Video

    Sponsored by: AT&T Corp

    Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  • Lowering Risk by Applying Consistent Security Across All of Your Locations

    Sponsored by: Juniper Networks, Inc.

    Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.

  • Remote Data Protection Demo

    Sponsored by: IBM

    Backup is a pretty complex ecosystem. There's data explosion, increasing recovery demands, a shrinking backup window and a limited IT budget. In this webinar you'll hear 2 key backup experts discuss the best practices around critical success factors.

  • Cisco ASA 5500 Series Adaptive Security Appliance

    Sponsored by: Cisco Systems, Inc.

    In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.

  • Cisco Secure Remote Access Solution

    Sponsored by: Cisco Systems, Inc.

    This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.

  • VMware ACE 2

    Sponsored by: VMware, Inc.

    Complex desktop environments have proven difficult for deployments, maintenance, and control. Download this free trial from VMware which combines the power and versatility of virtual machines with the security and control of centrally managed PCs

  • Seven Strategies for Effective Desktop Management

    Sponsored by: WebEx Communications, Inc.

    Remote and local desktop support is an increasingly difficult and expensive task for IT staffs. Listen to this Webcast to gain seven strategies for effective desktop management so your organization can immediately manage, protect and secure its PC assets

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.