remote work

Results 76 - 100 of 221Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
    
Ciena
Published By: RingCentral     Published Date: Jan 13, 2015
The world of work is changing. Not so long ago, most employees reported to a “desk job” in an office, and companies recruited talent locally. Businesses now recognize that to compete in an increasingly uncertain economy—and to attract skilled workers—they need to become more flexible, particularly about where employees work.
Tags : 
cloud, phone, it-leaders, mobile, mobile workforce, pbx
    
RingCentral
Published By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration, compliance, remote work
    
Webroot UK
Published By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : 
symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc, workforce mobile, saas
    
Symantec.cloud
Published By: Polycom     Published Date: Aug 16, 2017
"With the growth in remote workers, the need for collaborative meeting spaces is on the rise to connect on and offsite workforces. Explore how you can maximize your video conference rooms to drive video adoption, facilitate deeper collaboration, defy distance across your organization and lead in the workplace."
Tags : 
polycom, video conference, it infrastructure, collaboration
    
Polycom
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Insight     Published Date: Nov 27, 2017
In the new work world, traditional support will not keep workers engaged — or IT transformational. Meet Insight Managed Office, the ultimate end-to-end DaaS solution that helps IT orchestrate modern devices and secure cloud apps.
Tags : 
device as a service solutions, managed office, workplace services, modern workforce solutions, remote workforce solutions, device management, cloud applications, workforce productivity, it support
    
Insight
Published By: join.me     Published Date: Jan 29, 2014
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
remote support, solution, complex, communication, sophistication, business technology
    
join.me
Published By: join.me     Published Date: Jan 29, 2014
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
remote support, solution, complex, communication, sophistication, business technology
    
join.me
Published By: LogMeIn     Published Date: Feb 06, 2013
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
remote support, solution, complex, communication, sophistication, business technology
    
LogMeIn
Published By: LogMeIn     Published Date: Dec 03, 2012
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
logmein, support tool, remote support tool, help desk support, support, it help, it support
    
LogMeIn
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
logmein, remote support, remote support tool, support desk, remote support solutions, support agents, core functionality, usability, customization, branding, security, scalability, deployment model, remote support software, software development, business technology
    
LogMeIn Rescue
Published By: Sage     Published Date: Oct 29, 2014
If you have recently been to a seminar, attended a conference or webcast, or read a white paper or blog, you have most likely heard about cloud technology as it relates to the accounting profession. Cloud technology is an enabler that allows a business to shift computing power from local networks and desktop environments to a remote off-premises computing environment. Ef?ciency of operations is enhanced by removing the burden of managing networks, upgrades, and information technology operational issues.
Tags : 
cloud technology, service offerings, efficiency, managing networks, operational issues
    
Sage
Published By: IBM     Published Date: Jan 09, 2013
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment. Challenging economic times have facilitated a do more with less corporate mentality.
Tags : 
experience, employee, web experiences, simplify, ibm intranet experience suite, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment.
Tags : 
intranet, web experiences, customer experience, web content management, content delivery, business technology
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible.
Tags : 
cloud, networking, remote workers
    
Hewlett Packard Enterprise
Published By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce, remote workforce, network security, remote access, ssl vpn, productivity, aventail
    
Aventail
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection, business technology
    
Webroot
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail, security
    
Aventail
Published By: Extreme Networks     Published Date: Aug 30, 2016
The goal of a Cloud-Managed Network is to make deployment, management and control over network infrastructure devices very easy, offset the need for trained IT staff at remote locations or for geographically dispersed organizations, and it provides both OpEx and CapEx savings. This comprehensive white paper provides you with information needed to successfully guide you through the decision-making process of determining the right network for your business.
Tags : 
extreme networks, networking, network, cloud, cloud networks, wireless, cloud managed networking, cloud based network, cloud network infrastructure, cloud network architecture, private cloud network, cloud network management, hybrid cloud networking, cloud networking, cloud network solutions, business technology
    
Extreme Networks
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee