remote work

Results 151 - 175 of 221Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
As a tech leader, you recognize that disruption is afact of life. According to Gartner, enterprise IT has entered an era of digitalization where disruptive new products are providing a continuous stream of growth, innovation, and differentiation. IT overhauls in business productivity—moving to the cloud, supporting a remote workforce, and preserving valuable legacy data while maintaining security and control—are necessary for your business to remain competitive. These changes require communications solutions that can keep pace with the accelerating demands of the connected world.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
A great team is what makes a company successful. The maxim’s stayed true for decades, but what’s changed is the technology available to find, train, and retain that talent. Now, you have the ability to spread your talent pool across oceans. Each worker can have a specialized skill set to meet a range of needs within your company, and oftentimes the work will require some degree of a remote lifestyle. These needs can range from permanent remote workers to employees who travel regularly for client meetings. In fact, a 2015 Gallup poll reported that 37% of all United States workers said they have telecommuted. Being able to accommodate both workers who are out of range and those who are always on the go will help improve your company’s overall productivity and quality of work.
Tags : 
    
Microsoft Office 365
Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn, 320, gateway, protection, content filtering, kauffman, protection, security
    
Astaro
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Businesses increasingly have more remote workers. Whether working remote full-time, part-time or just while traveling for business, these workers rely heavily on their own mobile devices to stay connected, yet they still need to stay connected to their teams for meetings in their office. Now, more than ever, there’s a strong demand for a video conferencing solution that can provide a simple and instant connection from the office to the home and on the go. Download now to learn more!
Tags : 
lifesize, cloud, video, conference, remote, mobile, connection, software development, wireless, business technology
    
LifeSize, a division of Logitech
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or just traveling for business, these workers rely heavily on their own mobile devices to stay connected to their teams, as well as to participate in meetings. Now more than ever, remote workers want (and expect) face-to-face interaction—and they want a seat at the meeting. There’s a strong demand for a video conferencing solution that can provide a simple and instant connected experience from the office to the home and on the go. Download now to learn more about cloud video conferencing.
Tags : 
lifesize, cloud, cloud video, remote, mobile, conferencing, software development, business technology
    
LifeSize, a division of Logitech
Published By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : 
citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
    
Citrix
Published By: Toshiba     Published Date: Oct 01, 2013
Workers still see value in laptops for running most critical apps, IDC survey says. Click here to find out why.
Tags : 
toshiba, laptop, mac, computers, mobile workers, remote workers, international workers, printers, copiers, mfp, employee technology, workforce technology, business technology
    
Toshiba
Published By: Riverbed     Published Date: Aug 22, 2014
The performance of RecoverPoint continuous remote replication can be impacted by characteristics common to wide-area networks, including packet loss, latency and limited bandwidth. SteelHead WAN optimization appliances can be leveraged to overcome the negative effects of these impairments, delivering LAN-like performance for RecoverPoint and all other business applications traversing the WAN. In this paper you will learn about performance benefits of the combined EMC RecoverPoint and Riverbed SteelHead solution, as measured through collaborative testing from EMC and Riverbed.
Tags : 
performance, benefits, best-practices, networks, emc recoverpoint, collaborative testing, business technology
    
Riverbed
Published By: Riverbed     Published Date: Aug 19, 2014
EMC® RecoverPoint family provides cost-effective, local continuous data protection and/or continuous remote replication solutions that allow for any-point-in-time data recovery. Riverbed SteelHead WAN Optimization solutions deliver maximum performance for business applications and data transfers over Wide-Area Networks (WANs).
Tags : 
data protection, performance, optimization, data transfer, wan, networking, it management
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure, enterprise applications
    
Riverbed
Published By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : 
iboss, remote access, byod, cybersecurity, mobile workforce, business technology
    
iboss
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
MessageLabs Ltd.
Published By: Oracle     Published Date: Mar 18, 2014
Dramatic shifts in workplace norms as a result of remote sales teams are now a reality, as field-based personnel perform so many vital selling and strategic account management business functions, more effectively armed with tablets than ever before. Aberdeen research conducted for Sales Performance Management 2012: How the Best-in-Class Optimize the Front Line to Grow the Bottom Line (December 2011), shows that 60% of companies’ sales team members are primarily remote workers. Indeed, in Aberdeen research for Mobile HCM: Workforce and Talent Management on the Move (June 2010), 57% of respondents who track the impact of their mobile recruiting efforts report improved quality and/or size of their talent pool as a result of their work. Does attracting and retaining a quality sales force thus require corporate technologies and processes that are influenced by consumer trends and cultural sea changes? Moreover, are there benefits to enterprises that enable their sales team to work remotely?
Tags : 
oracle, data management, account management, sales performance management, remote workers, sales research, workplace shifts, sales strategy, data center
    
Oracle
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains
    
GeoTrust
Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management, aladdin
    
Aladdin
Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce, remote workforce, network security, remote access, ssl vpn, productivity, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device, network security, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access, remote access security, employee productivity, productivity, cost control, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn, aventail, network security
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail, security
    
Aventail
Published By: IBM     Published Date: Jun 19, 2008
The perfect mix of performance and energy savings, the IBM BladeCenter S is ideal for the small to mid-sized office and the remote office. It neatly consolidates your storage, servers and networking into a single chassis that plugs into a standard electrical outlet, supports virtually all applications, and uses less energy than comparable systems. Get inside the IBM BladeCenter S with this 3D Virtual Tour that lets you dissect the BladeCenter chassis and look through its components.
Tags : 
bladecenter, ibm, express seller, green, energy, energy efficient
    
IBM
Published By: iDirect     Published Date: Sep 27, 2011
Discover how satellite IP communications can extend broadband communications anywhere, and meet today's demand for constant connectivity.
Tags : 
idirect, satellite technology, satellite hubs, satellite line cards, satellite routers, vsat satellite solutions, satellite communications, evolution routers, infiniti remotes, satmanage network management
    
iDirect
Published By: iDirect     Published Date: Sep 27, 2011
Understand your options with this must-have list of criteria that can help ensure the success of your satellite deployment.
Tags : 
idirect, satellite technology, satellite hubs, satellite line cards, satellite routers, vsat satellite solutions, satellite communications, evolution routers, infiniti remotes, satmanage network management, business technology
    
iDirect
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
    
Internet Security Systems
Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom, secure communications, pointsec
    
Pointsec
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee