Terminal Emulation Protocols Reports

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 23 May 2014 | Published: 03 Mar 2014

Citrix

9 Advantages to Using Remote Support Tools for an IT Support Company/Consultant
sponsored by GFI Software
WHITE PAPER: With the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support.
Posted: 22 Dec 2010 | Published: 22 Dec 2010

GFI Software

Remote Data Protection Demo
sponsored by IBM
SOFTWARE DEMO: Backup is a pretty complex ecosystem. There's data explosion, increasing recovery demands, a shrinking backup window and a limited IT budget. In this webinar you'll hear 2 key backup experts discuss the best practices around critical success factors.
Posted: 31 Oct 2008 | Premiered: 30 Oct 2008

IBM

E-Book: Strategic guide to insider threat detection and breach response
sponsored by TechTarget Security
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

TechTarget Security

Windows PowerShell 2.0
sponsored by Microsoft
WEBCAST: Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended.
Posted: 12 Jun 2009 | Premiered: Jan 9, 2009

Microsoft

Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak
sponsored by Silver Peak
CASE STUDY: This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Silver Peak

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Optimize Application Performance and Security
sponsored by BlueCoat
DATA SHEET: Blue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.
Posted: 15 May 2009 | Published: 14 May 2009

BlueCoat