remote work

Results 1 - 25 of 227Sort Results By: Published Date | Title | Company Name
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : virtela, healthcare, remote user satisfaction, roi
     Virtela Communications, Inc.
By: Karya Technologies     Published Date: Nov 25, 2011
Access corporate desktop data at ease, even during commute. Remote access to desktop documents anytime, anywhere. Mobilize your enterprise file server
Tags : 
     Karya Technologies
By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
     Astaro
By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
     Entrust Datacard
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible. Like larger companies, midsize firms must make sure that they are effectively coordinating on-premise, public cloud, and private cloud capabilities. Unlike large companies, though, midsize firms are limited in both financial and technical resources to design and coordinate effective solutions to meet specific needs. Rather than invest in a major overhaul of their IT environments, midsize firms have to move incrementally, supplementing current resources with new cloud and on-premise capabilities that provide the performance needed to prosper in an increasingly competitive environment.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible.
Tags : cloud, networking, remote workers
     Hewlett Packard Enterprise
By: Lenovo UK     Published Date: Mar 14, 2019
In today’s workplace, work happens where we are, not where we go. To support this you need the four pillars of dynamic IT Download this infographic to find out how Lenovo can help you deliver the dynamic IT your workforce requires.
Tags : smarterworking, future-ready, dynamicit, remoteworking, workplaceit, smarterworkforce, dynamicworkplace, mobility
     Lenovo UK
By: Lenovo UK     Published Date: Mar 14, 2019
Lenovo commissioned Cebr to research the changing dynamics of workplaces around the UK. The report quantifies the potential gains from remote working and looks at issues such as: What attributes do people at the start of their careers look for in an employer? Will there be a continued shift towards remote working? And how much importance do people place on flexible working hours?
Tags : modernworkplace, flexibleworking, smartoffice, remoteworking, work-lifebalance, futureofwork, artificialintelligence, virtualreality
     Lenovo UK
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
As business becomes more global and teams can often be dispersed across cities or continents, businesses have begun adapting telecommuting as an added corporate culture benefit and as a way to recruit and retain key talent. As a result, managers may find themselves forced to respond to an all-new set of needs and concerns from their staffs. How does the international team leader ensure that the necessary lines of communication stay up when there are thousands of miles and half a dozen time zones separating offices?
Tags : communication, performance, accountability, video conferencing
     LifeSize, a division of Logitech
By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
     Cisco
By: LogMeIn     Published Date: Mar 19, 2015
Remote support technology, including remote control, desktop sharing, and web collaboration, is one of the most popular platforms used across TSIA service disciplines. Today’s remote support solutions offer much more than just remote control for PCs, their functional footprint is expanding to include support for more devices and richer analytics for trend analysis and supervisor dashboards. Remote support solutions are typically well regarded by users, consistently delivering one of the highest average satisfaction scores in TSIA’s annual Global Technology Survey. Service executives should acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support. Field services, education services, professional services, and managed services are all increasing adoption of these tools to boost productivity and avoid on-site visits. Download this white paper to learn more.
Tags : remote support, remote technology, customer support, productivity, remote technology
     LogMeIn
By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware AirWatch
By: Dialpad     Published Date: Apr 19, 2016
Workplace expectations are changing and companies are ditching outdated technology in favor of flexible, cloud-based services, freeing their employees to work from anywhere. From modern office spaces to popular business tools, this eBook breaks down the top trends of the workplace revolution, including: 1. The age of Millennial workers 2. Modern workspaces 3. Improving employee productivity and satisfaction 4. The rise of remote work
Tags : communication, internet, network management, best practices, business intelligence, business management, mobile
     Dialpad
By: Justworks     Published Date: Sep 27, 2017
Business owners and entrepreneurs create their businesses for a number of reasons: to grow an idea, build and inspire a team, make a difference. And all too quickly, those business owners can face the other side of running a business: paying employees, negotiating the best benefits for your teams, keeping up with myriad government regulations. Workplaces are getting even more complicated - for good reasons. Teams have more flexibility to work remotely. And the gig economy is exploding; in fact, about a third of the U.S. workforce works on something other than a full-time basis.
Tags : 
     Justworks
By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     IBM
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
     Akamai Technologies
By: Dell EMC     Published Date: Nov 02, 2015
Enterprises with remote or branch offices and small to midsized businesses face very specific infrastructure challenges. Dell PowerEdge VRTX addresses these by providing scalable servers, storage, and networking in a compact, converged, easy-to-manage platform. Here’s how it brings simplicity, versatility and efficiency to ROBO or SMB environments.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : security, multi-factor authentication, network security risks
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : vpn, proxies, security, security breach, technology
     Akamai Technologies
By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : hardware, tpm, it security, windows, telecommunication, byod
     Dell
By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
     Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com