remote work

Results 126 - 150 of 227Sort Results By: Published Date | Title | Company Name
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
anti spyware, anti virus, application security, security management
    
Symantec.cloud
Published By: Mitel     Published Date: Dec 20, 2016
Remote working programs can deliver great advantages to employers alike, but they require a higher level of connectivity to function at their best. Mobility tools like those from Mitel can help keep your employees connected and productive anywhere with a seamless, user-friendly experience.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Dec 20, 2016
Remote working programs can deliver great advantages to employers alike, but they require a higher level of connectivity to function at their best. Mobility tools like those from Mitel can help keep your employees connected and productive anywhere with a seamless, user-friendly experience.
Tags : 
    
Mitel
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: NetApp     Published Date: Sep 11, 2014
"VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
virtualization platform, remote desktop and applications, fas solution, storage utilization
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
    
NetApp
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Forcepoint     Published Date: Jun 06, 2019
As organizations become more distributed, directors of network security teams must provide connectivity to new locations, applications and systems at a moments notice. Whats more, protecting users and data from rising threats is changing the demands for network performance, manageability and security. In this session, we discuss how distributed organizations are enabling new locations, both physical and virtual, to be brought up quickly and managed consistently. We then examine how to take advantage of commodity broadband instead of traditional leased lines, implement business security processes seamlessly across all locations, and how to interactively monitor remote environments. Presenter: Michael Knapp, Director of Network Security Architects, Forcepoint This session is part of the Forcepoint-sponsored Network Security eSummit in partnership with the MIS Training Institute (MISTI). Watch the other event sessions: Digital Transformation and the Intersection of Networks, Securi
Tags : 
    
Forcepoint
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Expedia is the world's leading online travel company, providing business and leisure travelers with tools and information to easily research, plan, book, and experience travel. As the company’s early rapid growth stabilized, its IT department sought ways to help employees become more productive and collaborate more effectively across long distances. To meet this goal, the department deployed Microsoft® Exchange Server 2007.
Tags : 
expedia, microsoft, microsoft exchange, exchange server, messaging, collaboration, it management, productivity
    
Microsoft Exchange
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. Its the new reality and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and theyre no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers arent limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Riverbed     Published Date: Aug 22, 2014
The performance of RecoverPoint continuous remote replication can be impacted by characteristics common to wide-area networks, including packet loss, latency and limited bandwidth. SteelHead WAN optimization appliances can be leveraged to overcome the negative effects of these impairments, delivering LAN-like performance for RecoverPoint and all other business applications traversing the WAN. In this paper you will learn about performance benefits of the combined EMC RecoverPoint and Riverbed SteelHead solution, as measured through collaborative testing from EMC and Riverbed.
Tags : 
performance, benefits, best-practices, networks, emc recoverpoint, collaborative testing, wide area networks, best practices, collaboration
    
Riverbed
Published By: Riverbed     Published Date: Aug 19, 2014
EMC RecoverPoint family provides cost-effective, local continuous data protection and/or continuous remote replication solutions that allow for any-point-in-time data recovery. Riverbed SteelHead WAN Optimization solutions deliver maximum performance for business applications and data transfers over Wide-Area Networks (WANs).
Tags : 
data protection, performance, optimization, data transfer, wan, networking, it management
    
Riverbed
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Riverbed     Published Date: Feb 26, 2015
How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e. performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.
Tags : 
private clouds, public clouds, saas applications, vpn lines, hybrid clouds, hybrid enterprise, application performance management, business intelligence, cloud computing, infrastructure
    
Riverbed
Published By: IBM APAC     Published Date: May 12, 2017
With these facts in mind, the need to help different age groups work well together is clear. Younger generations have fundamentally different views about work and the world in general, which can be problematic when theyre expected to work alongside older workers. You must find ways to bridge the gaps between generations, while empowering individual generations to work in the manner that best suits them. Read on to learn more.
Tags : 
workplace, mobile workplace, mobile environment, remote working, workplace environment, digital transformation
    
IBM APAC
Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications, networking, wireless, enterprise applications, storage area networks, storage management, storage virtualization, encryption, firewalls, security management, application integration, analytical applications, business intelligence
    
Cisco Systems
Published By: Asure Software     Published Date: Mar 06, 2014
Since 2005, organizations have created more workspace changes eliminating vast (and dull) cubicle farms in favor of community spaces arranged to accomplish several goals including: Maximize existing workspace Foster more collaboration and teamwork Accommodate mobile/remote employees who no longer need a dedicated space in an office building Hot desking and desk hoteling are workspace strategies that are here to stay. This executive briefing will help any real estate or facility manager understand how to leverage these concepts, adapt to trends and get a return that the finance team will appreciate.
Tags : 
    
Asure Software
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco, remote access, remote network management, wireless security, total cost of ownership, configuration management
    
Astaro
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Read this white paper to learn how the rapid rise of remote and third-party users has created increased complexities for IT around network security and user expectations.
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.