remote work

Results 1 - 25 of 227Sort Results By: Published Date | Title | Company Name
Published By: LogMeIn EMEA     Published Date: Oct 11, 2019
More and more organizations are looking to implement an intuitive remote support solution that gives support professionals on-demand productivity and provides quick resolutions to the ever-evolving set of pains that bedevil support teams today. But choosing the best remote support solution can be a challenge, especially as user expectations grow and systems become more complex and offer more options and features. This buyer’s guide can help you select the remote support tool that will work best for your organization. With more than 15 years of experience, LogMeIn delivers remote support solutions with key features and functionalities that make us the market leader in the remote support space.
Tags : 
    
LogMeIn EMEA
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Jul 30, 2019
How to boost results, cut costs and manage risk in an internet-connected world Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed?organizations are re-architecting their networks and security to move their most valuable data?and applications to the cloud, in order to give their users much richer, faster, less expensive?access than ever before. Enabling remote sites and off-network users to securely connect?direct-to-cloud is the new challenge facing enterprises and government agencies.? How can distributed organizations achieve the reliable, secure connectivity to the cloud they?need? Many are now using internet technologies?for connect all of their users to cloud-based applications more productively and cost-effectively than ever before. Join Forcepoint for this informative discussion. In this session we will cover: How to accelerate
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
When it comes to connecting remote offices and employees, traditional distributed networks can't handle the new wave of cloud-based applications that are driving increasing speed and innovation across the enterprise. If you want to make sure that your network resources are being used more efficiently, this eBook will show you how using direct-to-cloud connectivity and scaling site-to-site with on-demand VPNs can reduce downtime and decrease complexity—ultimately saving you money.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As organizations become more distributed, directors of network security teams must provide connectivity to new locations, applications and systems at a moment’s notice. What’s more, protecting users and data from rising threats is changing the demands for network performance, manageability and security. In this session, we discuss how distributed organizations are enabling new locations, both physical and virtual, to be brought up quickly and managed consistently. We then examine how to take advantage of commodity broadband instead of traditional leased lines, implement business security processes seamlessly across all locations, and how to interactively monitor remote environments. Presenter: Michael Knapp, Director of Network Security Architects, Forcepoint This session is part of the Forcepoint-sponsored Network Security eSummit in partnership with the MIS Training Institute (MISTI). Watch the other event sessions: Digital Transformation and the Intersection of Networks, Securi
Tags : 
    
Forcepoint
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"The way we work has changed. More users are working remotely, satellite offices are connecting directly to the internet, and SaaS app usage is on the rise. How can your security technology keep up with all of these changes? A new category of products is emerging - the secure internet gateway. Built to solve the security challenges of today's mobile, cloud-enabled enterprise, the secure internet gateway is a critical component to securing today’s workforce. View the infographic to understand the five primary reasons for the rise of this category. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Engage2Excel     Published Date: Apr 29, 2019
Teleworking has grown 115% in the past decade, according to the Society for Human Resources. However, in 2017, a number of large employers made headlines by abandoning their telework initiatives, citing the desire to improve communication, collaboration and teamwork. This move was surprising to many for two reasons: • Nearly three-quarters of millennials express a desire to have more opportunities to work remotely1 . • Employers can save $11,000 per half-time telecommuter2. Do employees who work remotely feel less recognized, exhibit lower engagement levels or experience less attention from their manager? To find out, we conducted a regression analysis on our 2018 survey of 5,000 employees nationwide. The results presented on the following pages may surprise you.
Tags : 
    
Engage2Excel
Published By: Lenovo UK     Published Date: Mar 14, 2019
In today’s workplace, work happens where we are, not where we go. To support this you need the four pillars of dynamic IT Download this infographic to find out how Lenovo can help you deliver the dynamic IT your workforce requires.
Tags : 
smarterworking, future-ready, dynamicit, remoteworking, workplaceit, smarterworkforce, dynamicworkplace, mobility, iot, artificialintelligence
    
Lenovo UK
Published By: Lenovo UK     Published Date: Mar 14, 2019
Lenovo commissioned Cebr to research the changing dynamics of workplaces around the UK. The report quantifies the potential gains from remote working and looks at issues such as: What attributes do people at the start of their careers look for in an employer? Will there be a continued shift towards remote working? And how much importance do people place on flexible working hours?
Tags : 
modernworkplace, flexibleworking, smartoffice, remoteworking, work-lifebalance, futureofwork, artificialintelligence, virtualreality, workplacedynamics, workplaceresearch
    
Lenovo UK
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
    
Citrix Systems
Published By: Engage2Excel     Published Date: Feb 11, 2019
Teleworking has grown 115% in the past decade, according to the Society for Human Resources. However, in 2017, a number of large employers made headlines by abandoning their telework initiatives, citing the desire to improve communication, collaboration and teamwork. This move was surprising to many for two reasons: • Nearly three-quarters of millennials express a desire to have more opportunities to work remotely1. • Employers can save $11,000 per half-time telecommuter2. Do employees who work remotely feel less recognized, exhibit lower engagement levels or experience less attention from their manager? To find out, we conducted a regression analysis on our 2018 survey of 5,000 employees nationwide. The results presented on the following pages may surprise you.
Tags : 
    
Engage2Excel
Published By: Visier     Published Date: Jan 25, 2019
Global competition for talent, outsourcing labor, compliance legislation, remote workers, aging populations—these are just a few of the daunting challenges faced by HR organizations today. Yet the most commonly monitored workforce metrics do very little to deliver true insight into these topics. Leaders need to graduate from metrics to people analytics in order to uncover the important connections and patterns in their data that lead to better workforce decisions.
Tags : 
    
Visier
Published By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
    
ALE
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.