Remote Access Tools -Commercial: Difference between revisions

From OpenCommons
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 5: Line 5:
| image            = Remote Access Tools.jpg
| image            = Remote Access Tools.jpg
| imagecaption      = Cybersecurity and Privacy
| imagecaption      = Cybersecurity and Privacy
| chapter          = Business Continuity
| municipalities    =  
| municipalities    =  
| contributors      = Anna Lainfiesta
| contributors      = Anna Lainfiesta
Line 12: Line 13:
| description      =  
| description      =  
To cope with the current COVID19 disruption, organizations and individuals require  flexible mobile and remote work arrangements beyond their traditional workplaces, while ensuring confidential data and systems are protected.
To cope with the current COVID19 disruption, organizations and individuals require  flexible mobile and remote work arrangements beyond their traditional workplaces, while ensuring confidential data and systems are protected.
}}
}}__NOTOC__
 
=Challenges =
=Challenges =
* Businesses and organizations need convenient, affordable, and secure remote access tools and management guidance.
* Businesses and organizations need convenient, affordable, and secure remote access tools and management guidance.

Latest revision as of 05:07, January 25, 2023



Remote Access Tools -Commercial
GCTC logo 344x80.png
Remote Access Tools.jpg
Cybersecurity and Privacy
Team Organizations Cybersecurity and Privacy
Team Leaders Pamela Gupta
Damien Thwaites
City, State
Contributors Anna Lainfiesta
Website
Document

Description

To cope with the current COVID19 disruption, organizations and individuals require flexible mobile and remote work arrangements beyond their traditional workplaces, while ensuring confidential data and systems are protected.

Challenges

  • Businesses and organizations need convenient, affordable, and secure remote access tools and management guidance.

Solutions

  • There are various remote access tools that are being offered for free or with discounts for the next few months. Before implementing remote access products, organizations should carefully evaluate their needs and priorities for protecting their data and devices against the effectiveness, ease of scaling capacity, ownership costs, and technology support overheads of vendor products.

Resources