Remote Access Management Reports

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020

TechTarget ComputerWeekly.com

Endpoint protection: Whitelisting and Beyond
sponsored by TechTarget Security
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

TechTarget Security

Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE: Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Information Security Magazine

Improving the mobile experience through solid state drive
sponsored by Intel Corporation
WHITE PAPER: Intel IT is evaluating solid-state drive (SSD) technology to better understand the benefits to users and the impacts on the enterprise. We have initiated a proof of concept (PoC) study that includes extensive benchmark testing as well as deployment of notebooks with SSDs to the Intel workforce.
Posted: 27 May 2009 | Published: 05 Jan 2009

Intel Corporation

Field Service Mobility Best Practices
sponsored by NetMotion Wireless
WHITE PAPER: Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

NetMotion Wireless

Implementing a "Smart IPS": IANS Working Knowledge Series™
sponsored by Sourcefire
CASE STUDY: The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

Sourcefire

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation