remote

Results 76 - 100 of 749Sort Results By: Published Date | Title | Company Name

Seamless Engagement for Midsize Companies

Published By: Avaya     Published Date: Jan 28, 2015
This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.
Tags : 
collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
Avaya

Full-Size Collaboration for Mid-Size Companies

Published By: Avaya     Published Date: Feb 06, 2015
This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.
Tags : 
collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
Avaya

Seamless engagement for midsize companies

Published By: Avaya     Published Date: Jun 01, 2015
How well connected are you? That’s the challenge in today’s mobile, virtual business landscape as companies strive for consistent communications between employees, business partners, and clients. Too often, a remote working world can feel splintered, disconnected, and complicated, resulting in lower productivity—and lost opportunity.
Tags : 
avaya, cloud computing, mobile, unified communications, integration, application management, wireless infrastructure, wireless messaging
    
Avaya

Video Collaboration Use Cases: Driving Productivity and Results

Published By: Avaya     Published Date: Jan 04, 2017
This white paper describes a sampling of popular use cases for video collaboration—expert anywhere, training, project management, remote eyes, and customer meetings—and the benefits of these applications.
Tags : 
avaya, video collaboration, communications solutions, unified communications, contact center, collaboration, midsize business solutions, business technology
    
Avaya

The SSL VPN Buyer's Guide

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Tags : 
buying guide, buyers guide, vpn purchase, ssl, vpn, ssl vpn, secure remote access, policy management
    
Aventail

Increase Productivity and Reduce Security Risks for Teleworkers

Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce, remote workforce, network security, remote access
    
Aventail

Why Replace your IPSec for Remote Access

Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade
    
Aventail

The Remote Access Imperative in Disaster Recovery

Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn
    
Aventail

End Point Control: Secure Remote Access with Reduced Risk and Increased IT Control

Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail, remote access
    
Aventail

Aventail Smart Secure Access Control: Secure and Easy for Users and IT

Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi
    
Aventail

SSL VPN Checklist

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail

Infonetics Report: Enforcing Network Access Control Market Outlook and Worldwide Forecast

Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail
    
Aventail

Secure Mobile Access Using SSL VPNs

Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device
    
Aventail

ROI Comparison: SSL VPNs or IPSec for Remote Access

Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access
    
Aventail

Gartner Report: Magic Quadrant for SSL VPN

Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn
    
Aventail

IPSec vs. SSL VPNs for Secure Remote Access

Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail
    
Aventail

Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough

Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix

Security Beyond Alarms and Into the Connected World

Published By: AVIDwireless     Published Date: Dec 10, 2010
A look at environmental monitoring in a Connected World, using wireless remote monitoring and control
Tags : 
wireless environmental monitoring, m2m, connected world, wireless sensors, wireless m2m, wireless remote monitoring and control
    
AVIDwireless

Secure, Remote Access for IT Infrastructure Management

Published By: Avocent     Published Date: Mar 06, 2011
Download this Free Paper to learn how the Avocent ACS advanced console server offers the most feature-rich set of capabilities in modern console servers. The ACS console server provides the scalability, reliability and security a company requires to control and manage servers and other networked devices.
Tags : 
manage servers, avocent, emerson, pbx, device management, it infrastructure management, remote management, infrastructure
    
Avocent

Branch Infrastructure Management (SRMI)

Published By: Avocent     Published Date: Aug 22, 2011
Challenges and solutions for centralized remote office management.
Tags : 
avocent, branch infrastructure management, srmi, remote office management, centralized it staff, remote office solutions, centralized it management, internetworking hardware
    
Avocent

Centralized Management Software: Best Practics to Control Your Data Center

Published By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : 
avocent, centralized management software, best practices, data center control, secure access, remote maintenance, kvm server management, full remote access
    
Avocent

Agile and Secure Desktop Delivery with Amazon WorkSpaces

Published By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
    
AWS

Simplifying large-scale Internet of Things (IoT) device deployments

Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS

Medication Adherence & Smart Devices for Clinical Trials by Ypsomed, Philips, & AWS

Published By: AWS     Published Date: Jul 16, 2019
Ypsomed is a leader in the development and manufacturing of injection and infusion systems. The company is keenly aware of the multi-billion dollar problem of poor medication adherence and the need to measure medicine intake and ensure doses are taken at the correct time. Ypsomed sought to create a digital solution for medication adherence monitoring and smart device management for contract research organizations’ (CROs) use in clinical trials, including self-injection systems for trial participants to administer medications at home. Yet the company faced serious demands for remote device management, global scale, and privacy and security regulations such as HIPAA and GDPR. To solve these challenges, Ypsomed adopted Philips’ HealthSuite digital platform (HSDP), a cloud platform built on Amazon Web Services (AWS). HSDP allows Ypsomed to connect devices to the cloud and remotely manage them; store data; and manage and scale services globally within healthcare regulatory, privacy, and s
Tags : 
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.