Remote Access Network Security Reports

Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 Mar 2020

TechTarget ComputerWeekly.com

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020

AT&T Cybersecurity

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Small Business VoIP: The Basics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business VoIP combines voice and data together on a single, secure network allowing your employees to stay connected with the people and data they need. The following is a guide to why you might want to consider a small business VoIP system.
Posted: 25 Sep 2008 | Published: 25 Sep 2008

Cisco Systems, Inc.

Next Generation Enterprise WAN Regional WAN Overview
sponsored by Cisco Systems, Inc.
WHITE PAPER: Enterprises with large-scale networking needs including remote branch-office connectivity should read this white paper to get an overview of WAN architecture that not only provides advanced routing functionality, but also allows for video collaboration, access control and secure connectivity, application performance optimization, mobility and more!
Posted: 11 Jul 2012 | Published: 31 Oct 2011

Cisco Systems, Inc.

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 21 Jul 2015 | Published: 03 Mar 2014

Citrix

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software