"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

remote access tool

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
Published By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : 
threat, data, security, it management, malware, banking, cyber theft, remote access tool, remote access trojan, carberp, carbanak, business intelligence, data quality, employee performance, productivity
    
Vectra Networks
Published By: LogMeIn     Published Date: Mar 01, 2012
Traditional remote access and meeting tools were not designed as remote support tools for helpdesks and IT professionals. LogMeIn consults daily with helpdesk and operations managers and here's what we've learned are the top five hidden costs of using legacy tools to provide remote support.
Tags : 
support tools, customer support, technical support, technology, it support, service desk, help desk, business analytics, business intelligence
    
LogMeIn
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.
Tags : 
palo alto, exploit kits, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
The role of customer service is one that is valued and well understood by many organizations. However, making the leap from correlating customer service activities with overall performance results to investing in strategies that deliver top-notch results is increasingly becoming a key differentiator. Top performing businesses have long understood the financial ramifications of a satisfied and engaged customer and continue to act on developing a profitable model to engage, interact, and win with their key customers. This document will highlight the financial link between better customer service and increased company profitability. It will also highlight several best practices that help organizations convert their service businesses from a cost center into a profit center.
Tags : 
logmein, aberdeen group, customer service, customer support, roi, customer satisfaction, crm, customer retention, customer service management, remote access tools, collaboration, software development, customer experience management
    
LogMeIn Rescue
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing, remote access, access control, security management
    
ESET
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management, remote network management
    
Quocirca
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory