Remote Access Network Security Reports

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020

AT&T Cybersecurity

Computer Weekly - 9 March 2021: Are you ready to return to the office?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a year after lockdown began, we look at employers' changing attitudes to returning to the workplace. We find out how the software developer community has coped during the Covid-19 pandemic. And we examine the cyber security concerns prompted by latest social media craze, Clubhouse. Read the issue now.
Posted: 15 Mar 2021 | Published: 09 Mar 2021

TechTarget ComputerWeekly.com

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Implementing a "Smart IPS": IANS Working Knowledge Series™
sponsored by Sourcefire
CASE STUDY: The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

Sourcefire

Endpoint protection: Whitelisting and Beyond
sponsored by TechTarget Security
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

TechTarget Security

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE: Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Information Security Magazine

New Options to Enable Remote Access in the Network
sponsored by TechTarget Networking
EBOOK: This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
Posted: 04 Oct 2017 | Published: 30 Sep 2017

TechTarget Networking

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies