Skip to main content
 

remote

Results 326 - 350 of 711Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance, restore point objectives, rto, disaster recovery, remote office backup consolidation, wafs, vtl, dr solution gap, xpress restore, fulcrum
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: IBM     Published Date: Oct 21, 2009
This paper examines the impact and adoption rates of 11 Green IT initiatives in mid-size organizations around the world.
Tags : 
green it, ibm, server virtualization, storage consolidation, desktop virtualization, pc power management, printer consolidation, remote conferencing, telecommuting, it equipment recycling
    
IBM
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management, datacenter management, axeda, high availability, spend management
    
Axeda Corporation
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox, sarbox, sarbanes oxley, sarbanes-oxley, pci, pci-dss, pci dss, compliance, auditing, audit, security audit, axeda
    
Axeda Corporation
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : 
stratus technology, server virtualization, virtual machine, automated software, data centers
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Apr 14, 2009
Has the economic meltdown taken its toll on your business? Is the endless onslaught of bad news making it difficult to maintain a positive perspective? The good news is that despite the economic downturn, there’s never been a better time to raise the bar for your IT capabilities. Mature virtualization solutions, new affordable uptime solutions, powerful integrated capabilities and an increased focus on operational simplicity all enable businesses like yours to enhance IT operations — without biting off too much of your budget. Here are five things you can do immediately and affordably to add value to your business.
Tags : 
stratus, cost cutting, it costs, it infrastructure, it capabilities, budget, economics, economic downturn, service levels, slas, x86 servers, five-nines service levels, ftscalable storage, virtualization, mission-critical operations, vmware environments, small-to-medium businesses (smbs), remote it environments, stratus avance, it operations
    
Stratus Technologies
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Expedia is the world's leading online travel company, providing business and leisure travelers with tools and information to easily research, plan, book, and experience travel. As the company’s early rapid growth stabilized, its IT department sought ways to help employees become more productive and collaborate more effectively across long distances. To meet this goal, the department deployed Microsoft® Exchange Server 2007.
Tags : 
expedia, microsoft, microsoft exchange, exchange server, messaging, collaboration
    
Microsoft Exchange
Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy, password policy, cisco asa 5500, secure vpn
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall, vpn, unauthorized access, spam and phishing, real-time protection, threat-protected vpn, safe remote access, antivirus, anti-spyware, anti-spam, anti-phishing
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
Here are some things to consider when choosing Cisco SMB Solutions that enable you and your colleagues to work from anywhere.
Tags : 
cisco, virtual office, vpn, firewall, virtual private network, networking costs, recruitment reach, remote employees
    
Cisco
Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies
    
Catapult
Published By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies
    
Catapult.
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing
    
ESET
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection
    
Webroot UK
Published By: Vendor Safe Technologies     Published Date: Jan 21, 2010
The Most Common PCI Compliance Mistakes of Brick-and-Mortar Locations
Tags : 
vendor safe technologies, pci security deficiency, firewall, remote access, authentication, wireless network, point of sale software, credit card
    
Vendor Safe Technologies
Published By: GoToMeeting     Published Date: Jul 29, 2011
Watch this on-demand Webinar to hear Terrence Gargiulo, president of MakingStories.net, share stories of how companies use virtual collaboration technology to address these challenges and effectively manage projects.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the training challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: Citrix Online     Published Date: Jun 09, 2010
This new white paper examines key challenges facing customer support organizations and explores the many advantages of collaborative remote support, including ad hoc training, faster first-contact resolution and an improved customer experience.
Tags : 
citrix gotoassist, corporate remote support, customer service, loyalty rentention, desktop management, manager monitoring
    
Citrix Online
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.