Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Remote Access Security

   

Your Search returned 56 results from our White Paper Library

Sort By
  • Close-button

    Remote Access Security

Cisco Systems, Inc.

Internet Security

Cisco 2010 Small Business

From IP-based video surveillance to social media security, you’ll learn how the latest technology will keep you not only up and running but ahead of the...


Citrix

Remote Access Technologies

Solution Brief: Complete Technical Solution for Enabling...

Turn the iPad and other devices into a powerful business tool with an employee-owned device program.


Citrix

Remote Access Technologies

Checklist for an Employee-Owned Notebook or PC Program

Provide employees complete control over their personal computing technology and free IT from managing non-strategic assets to focus on high-value, high...


Citrix

Remote Access Technologies

Solution Brief: BYO – Rethinking Your Device Strategy

Provide your employees and contractors the freedom and flexibility to use their own computer for work—while eliminating security, control and support issues....


NetIQ

Access Control

Is your User Management Process Getting you Down?

This paper explains how automating user privileges can help you improve the security and efficiency of user provisioning, change user and de-provisioning....


Citrix

BYOD (Bring Your Own Device)

The Complete Solution for Enabling BYO

Download this white paper that offers the complete solution for enabling BYO.


Citrix

Remote Access Security

Delivering Corporate Data Securely on Employee iPads

This paper describes the issues that arise when allowing iPads into the enterprise network and the steps IT must take to maintain control.


Cisco Systems, Inc.

Access Control

Secure Network Access for Personal Mobile Devices

Any-device programs raise important questions about privacy and security—especially in government. In this white paper, you’ll discover the strategies...


Previous 1 3 4 5 6

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?