Remote Access TechnologiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementNetworking and Communications SolutionsRemote Access Technologies  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 266 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Podcast: Understanding Storage Requirements for Virtualized Desktop Environments by SearchDataCenter.com

May 02, 2012 - (Free Research)
Storage can cause many problems for VDI. Brian Madden discusses these challenges and also explores one potential solution, a primary storage appliance, and evaluates how it performs in this expert podcast. 
(PODCAST) READ ABSTRACT |

Desktop Management in a Changing World by SearchDataCenter.com

April 20, 2012 - (Free Research)
Desktop virtualization authority Brian Madden discusses how current desktop management practices are evolving to meet changing user needs in this webcast. Explore the how you can leverage the latest virtualization solutions to solve today’s desktop management challenges. 
(VIDEOCAST) READ ABSTRACT |

Desktop Virtualization with Dell and Citrix: Solving the Desktop Lifecycle Management Challenge by Dell, Inc.

July 01, 2009 - (Free Research)
This white paper provides analysis and advice on how Dell Virtual Remote Desktop (VRD), a server-hosted desktop virtualization, can deliver substantial benefits, simplifying lifecycle management, and driving ongoing cost and productivity benefits. 
(WHITE PAPER) READ ABSTRACT |

Topographies for the Simply Connected Campus: Juniper's Simply Connected Campus Network Platform Architectures by Juniper Networks, Inc.

May 31, 2012 - (Free Research)
Uncover a set of solutions that can help you satisfy all the requirements of a campus network, conquer the environment's inherent challenges, and provide a wired-like experience to your end users, no matter what device they are using. 
(WHITE PAPER) READ ABSTRACT |

The Distributed Enterprise by Raritan Inc.

January 2007 - (Free Research)
This paper addresses the added value (in terms of uptime and security) of out-of-band access and control tools for branch offices, and why out-of-band should be considered as a component of branch office networks. 
(WHITE PAPER) READ ABSTRACT |

Understanding Remote Server Management in Small and Medium-size Business by Raritan Inc.

December 2005 - (Free Research)
This white paper summarizes the results of a survey on remote server management in small and medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Optimize Application Delivery for Global Deployment Of SAP® BusinessObjects™ Enterprise with Blue Coat Systems Acceleration by BlueCoat

March 2011 - (Free Research)
Blue Coats SAP BusinessObjects Enterprise Software is a market leading Business Intellience solution, enabling customers to discover and share business insight for optimal decision making. 
(WHITE PAPER) READ ABSTRACT |

WAN Optimization for Today and Tomorrow by BlueCoat

February 2011 - (Free Research)
This whitepaper provides key insight for IT professionals interested in accelerating user performance by two to three hundred times, reducing bandwidth for files, storage and email by 50 to 95 percent, and making consolidation and centralization possible. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: Accelerating SSL Applications Across the WAN by BlueCoat

June 2010 - (Free Research)
Secure Sockets Layer (SSL) is the industry-standard protocol for establishing a secure communications link when transmitting information over untrusted networks. However, SSL can create complications when it comes to prioritizing, optimizing, and accelerating network traffic. This paper outlines a solid strategy for optimizing SSL applications. 
(WHITE PAPER) READ ABSTRACT |

Power efficiency and sustainable Information Technology by Intel Corporation

December 2008 - (Free Research)
Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner. 
(WHITE PAPER)

vPro Resource Kit download by Intel

June 2012 - (Free Research)
Companies need to understand the configuration requirements of remote desktop technology before they actually purchase it. This resource kit provides free tools, videos, and documentation to help you determine the right solution for your organization and ensure its successful installation. 
(DOWNLOAD) READ ABSTRACT |

Best Practices for Managing and Understanding Mobile Authentication by SearchSecurity.com

July 2013 - (Free Research)
In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies. 
(EBOOK) READ ABSTRACT |

E-Book: Strategic guide to insider threat detection and breach response by SearchSecurity.com

March 2011 - (Free Research)
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan. 
(EGUIDE) READ ABSTRACT |

E-Guide: How to Determine if VDI is Right for your Company and Ways to Overcome Common Annoyances by SearchDataCenter.com

May 2011 - (Free Research)
Even though the thought of virtual desktops has caught everyone's attention, the actual number of installations remains small. This expert e-guide from SearchVirtualDesktop.com explains how organizations can determine whether this technology is right for them by calculating the return on investment from VDI. 
(EGUIDE) READ ABSTRACT |

WLAN Planning For BYOD by SearchSecurity.com

February 2013 - (Free Research)
This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control. 
(EGUIDE) READ ABSTRACT |

Remote and Branch Office Backup and Recovery 101 by Iron Mountain

February 2012 - (Free Research)
Check out this white paper for best practices when planning and managing a comprehensive offsite backup and recovery strategy. Learn how careful planning with remote or branch offices (ROBOs) can allow for seamless data protection without compromise, and discover key questions to ask when planning remote office backup strategies. 
(WHITE PAPER) READ ABSTRACT |

Best practices to make BYOD simple and secure by Citrix

June 2014 - (Free Research)
Gain best practices and key considerations to keep in mind when implementing a Bring Your Own Device (BYOD) program. Find out how you can simplify management and reduce costs while keeping data secure and compliant in this resource. 
(WHITE PAPER) READ ABSTRACT |

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management by eEye Digital Security

July 2010 - (Free Research)
In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Remote Access Solution by Cisco Systems, Inc.

July 2008 - (Free Research)
This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources. 
(DEMO) READ ABSTRACT |

Medio's™ analytics transform mobile data into business action, IBM System x and Intel Xeon processors helps take the guesswork out of CRM- A Case Study by IBM

November 2011 - (Free Research)
Based in Seattle, Medio Systems is a leader in the emerging field of predictive analytics, quickly analyzing data streams to give mobile phone carriers and providers actionable insight into their customers’ preferences and buying habits. 
(WHITE PAPER) READ ABSTRACT |

The CIO Perspective on Intel vPro Technology by Intel

January 2010 - (Free Research)
Gerry Weaver, CIO of the State of Indiana, and Diane Bryant, CIO of Intel, talk about how Intel vPro technology helps address end-user and IT efficiencies in their environments. The CIOs discuss real ROI numbers from Intel vPro technology, including savings of $1 million or more. 
(VIDEO)

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 2010 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 2010 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

Androids in the Enterprise by McAfee, Inc.

November 2011 - (Free Research)
McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements. 
(WHITE PAPER) READ ABSTRACT |

Technology Availability & Disaster Recovery Spoken in the Language of Business by SunGard Availability Services

October 2013 - (Free Research)
This upcoming webcast presentation will help you learn key details about the state of DR in today's business landscape, as well as five processes that will help you make sure your DR plan has you prepared for whatever comes. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 266 | Next Page

> Explore alternative searches for: Remote Access Technologies

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts