Remote Access Tools -Commercial: Difference between revisions

From OpenCommons
Jump to navigation Jump to search
m (1 revision imported)
No edit summary
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{COVID-19
{{COVID-19
| title            = Examples of Commercially-Available Online Meeting & Collaboration Tools
| title            = Examples of Commercially-Available Online Meeting & Collaboration Tools
| team              = Cybersecurity and Privacy Advisory Committee (CPAC)
| team              = Cybersecurity and Privacy
 
| leader            = Pamela Gupta, Damien Thwaites
| leader            = [mailto:pamela.gupta@outsecure.com Pamela Gupta], Area Leader - [mailto:damien@adaptablesecurity.org Damien Thwaites]
| image            = Remote Access Tools.jpg
| image            =  
| imagecaption      = Cybersecurity and Privacy
| imagecaption      =  
| chapter          = Business Continuity
| municipalities    =  
| municipalities    =  
| contributors =   Wiki Editor -[https://www.linkedin.com/in/alainfiesta/ Anna Lainfiesta]
| contributors     = Anna Lainfiesta
| status            =   
| status            =   
| website          =  
| website          =  
| download          =  
| download          =  
| description      =  
| description      =  
To cope with the current COVID19 disruption, organizations and individuals require  flexible mobile and remote work arrangements beyond their traditional workplaces, while ensuring confidential data and systems are protected.
To cope with the current COVID19 disruption, organizations and individuals require  flexible mobile and remote work arrangements beyond their traditional workplaces, while ensuring confidential data and systems are protected.
 
}}__NOTOC__
=Challenges =
=Challenges =
* Businesses and organizations need convenient, affordable, and secure remote access tools and management guidance.
* Businesses and organizations need convenient, affordable, and secure remote access tools and management guidance.
Line 31: Line 29:
* [https://www.microsoft.com/security/blog/2020/03/12/support-working-from-home-securely/ Work remotely, stay secure—guidance for CISOs] - Microsoft has shared some best practices and product information to help organizations and employees remain productive without increasing cybersecurity risk.
* [https://www.microsoft.com/security/blog/2020/03/12/support-working-from-home-securely/ Work remotely, stay secure—guidance for CISOs] - Microsoft has shared some best practices and product information to help organizations and employees remain productive without increasing cybersecurity risk.
* [https://us.norton.com/internetsecurity-emerging-threats-working-from-home-due-to-coronavirus.html Working remote due to the coronavirus? These 7 tips will help keep your connections secure] - Norton has shared tips to help stay secure when you work from home.
* [https://us.norton.com/internetsecurity-emerging-threats-working-from-home-due-to-coronavirus.html Working remote due to the coronavirus? These 7 tips will help keep your connections secure] - Norton has shared tips to help stay secure when you work from home.
}}

Latest revision as of 05:07, January 25, 2023



Remote Access Tools -Commercial
GCTC logo 344x80.png
Remote Access Tools.jpg
Cybersecurity and Privacy
Team Organizations Cybersecurity and Privacy
Team Leaders Pamela Gupta
Damien Thwaites
City, State
Contributors Anna Lainfiesta
Website
Document

Description

To cope with the current COVID19 disruption, organizations and individuals require flexible mobile and remote work arrangements beyond their traditional workplaces, while ensuring confidential data and systems are protected.

Challenges

  • Businesses and organizations need convenient, affordable, and secure remote access tools and management guidance.

Solutions

  • There are various remote access tools that are being offered for free or with discounts for the next few months. Before implementing remote access products, organizations should carefully evaluate their needs and priorities for protecting their data and devices against the effectiveness, ease of scaling capacity, ownership costs, and technology support overheads of vendor products.

Resources