remote access tool

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
Published By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : 
threat, data, security, it management, malware, banking, cyber theft, remote access tool, remote access trojan, carberp, carbanak
    
Vectra Networks
Published By: LogMeIn     Published Date: Mar 01, 2012
Traditional remote access and meeting tools were not designed as remote support tools for helpdesks and IT professionals. LogMeIn consults daily with helpdesk and operations managers and here's what we've learned are the top five hidden costs of using legacy tools to provide remote support.
Tags : 
support tools, customer support, technical support, technology, it support, service desk, help desk
    
LogMeIn
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.
Tags : 
palo alto, exploit kits, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 18, 2019
The modern desktop: Always-on collaboration on every device Today’s workforce is radically changing. Fewer employees are working in traditional office spaces and the number of remote employees has grown exponentially. Everyone is on the same team yet how they all interact and collaborate has been fundamentally altered. The future success of enterprises requires an all-encompassing digital transformation. Creating a seamlessly-connected IT platform with Citrix Workspace and Microsoft Teams gives employees access to the productivity, communication, and collaboration tools they love, helping them excel at their job. Onsite, remote, or on-the-go, they can interact from any location using any device with all corporate data stored securely in the cloud. Plus, IT administrators will love Citrix automated workflows, real-time analytics, and ability to centrally manage and control corporate data
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
The role of customer service is one that is valued and well understood by many organizations. However, making the leap from correlating customer service activities with overall performance results to investing in strategies that deliver top-notch results is increasingly becoming a key differentiator. Top performing businesses have long understood the financial ramifications of a satisfied and engaged customer and continue to act on developing a profitable model to engage, interact, and win with their key customers. This document will highlight the financial link between better customer service and increased company profitability. It will also highlight several best practices that help organizations convert their service businesses from a cost center into a profit center.
Tags : 
logmein, aberdeen group, customer service, customer support, roi, customer satisfaction, crm, customer retention, customer service management, remote access tools, collaboration, software development, business technology
    
LogMeIn Rescue
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing
    
ESET
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Search      

Add Research

Get your company's research in the hands of targeted business professionals.