secure remote access

Results 26 - 42 of 42Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Avocent     Published Date: Mar 06, 2011
Download this Free Paper to learn how the Avocent ACS advanced console server offers the most feature-rich set of capabilities in modern console servers. The ACS console server provides the scalability, reliability and security a company requires to control and manage servers and other networked devices.
Tags : 
manage servers, avocent, emerson, pbx, device management, it infrastructure management, remote management
    
Avocent
Published By: Citrix     Published Date: Nov 04, 2013
Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.
Tags : 
citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access
    
Citrix
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : 
citrix, security, remote access
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.
Tags : 
citrix, security, remote access, delivery
    
Citrix Systems, Inc.
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains
    
GeoTrust
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Tags : 
buying guide, buyers guide, vpn purchase, ssl, vpn, ssl vpn, secure remote access, policy management
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail
    
Aventail
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : 
ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec
    
NCP Engineering GmbH
Published By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : 
avocent, centralized management software, best practices, data center control, secure access, remote maintenance, kvm server management, full remote access
    
Avocent
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.