remote security

Results 51 - 75 of 114Sort Results By: Published Date | Title | Company Name

Key considerations for delivering secure unparalleled remote access

Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems

SMS Authentication: 10 Things to Know-Before You Buy

Published By: SafeNet     Published Date: Jul 20, 2010
In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!
Tags : 
safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security, authentication
    
SafeNet

Decision Guide for Hardware and Software Authentication: Choosing the Right Approach

Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet

The Case for Remote Security

Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Safeguarding your business doesn’t have to be a long, time-consuming endeavor. Through mobile security management, you can improve visibility with real-time alerts and video clips.
Tags : 
remote security, business protection, security, business intelligence, business management
    
Tyco Integrated Security

The Case for Mobile Security Management

Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Start protecting your company with a small piece of technology that 85% of business owners tow around as their life force: your smartphone. Discover how making your business more secure can be as simple as it is vital.
Tags : 
remote security, business protection, security, mobile data systems, mobile workers
    
Tyco Integrated Security

Agile and Secure Desktop Delivery with Amazon WorkSpaces

Published By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
    
AWS

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing

Secure Remote Vendor Access to the Enterprise Data Center

Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation

Meeting SOX, PCI, and HIPAA Compliance with Secure and Auditable Vendor Access

Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Axeda Corporation

Network Security Checklist

Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
Cisco

Secure Remote Access Your Users Will Love

Published By: Citrix Systems     Published Date: Dec 10, 2015
Simple, secure ways to deliver a great experience for remote users.
Tags : 
citrix, remote access, mobile workstyles, multidevice, security, productivity, it management, enterprise applications
    
Citrix Systems

Remote Computer Repair with IntelŪ Core™ vPro™

Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with IntelŪ CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage
    
Intel

Easy Configuration with IntelŪ Core™ vPro™ Setup and Configuration Software 8.0

Published By: Intel     Published Date: Aug 10, 2012
Learn how Intel Core vPro with SCS8.0 can help make Setup easy with an array of features from scanning to applying patches right from IT desk.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Remote Power Management with IntelŪ Core™ vPro™

Published By: Intel     Published Date: Aug 10, 2012
CoreT vProT processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

3rd Gen IntelŪ Core™ vPro™ Processor Crimeware Protection

Published By: Intel     Published Date: Aug 10, 2012
3rd generation IntelŪ CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Windows 7* Security with IntelŪ Core™ vPro™ Processors

Published By: Intel     Published Date: Aug 10, 2012
See why 3rd generation IntelŪ CoreT vProT processors are ideal for Windows 7 security in your demanding and fast moving business environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

What is IntelŪ Core™ vPro™ Technology

Published By: Intel     Published Date: Aug 10, 2012
What is IntelŪ CoreT vProT technology? Learn about the security and manageability features that deliver a secure and efficient IT environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Managed PKI Solution from Symantec Enabled by IntelŪ vPro™ Technology Video

Published By: Intel     Published Date: Aug 10, 2012
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Citrix Xenclient local virtual desktop technology for laptops

Published By: Intel     Published Date: Aug 10, 2012
Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

McAfee Deep Defender

Published By: Intel     Published Date: Aug 10, 2012
An in-depth look at how McAfee Deep Defender and DeepSAFE work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Intel Identity Protection Technology

Published By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

3rd Generation IntelŪ Core™ Processor: Comparison Guide

Published By: Intel     Published Date: Aug 10, 2012
IntelŪ CoreT vProT Processor Comparison provides a Good, Better, Best guide for selecting the best processors to power your business PCs
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Endpoint Protection, Multilayer Security from Intel and McAfee

Published By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

IntelŪ Laptop Processor Comparison Tool

Published By: Intel     Published Date: Aug 10, 2012
Find the IntelŪ laptop processor to meet your business needs with this interactive laptop processor comparison tool
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

An Alternative to Today's Distributed Content Security Chaos

Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.