Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

@TheOffice.Wherever!

Trispen's @TheOffice.Wherever! provides Secure Remote Access by letting you virtually plug into your Office Network from anywhere in the world. Any PC with Internet Access can now be used as if it is directly connected to your Office LAN!

There are so many Remote Access Solutions out there... what makes @TheOffice.Wherever! different?

Choosing the ideal solution for your company can be a daunting task. @TheOffice.Wherever! aims to make Remote Access affordable for the Small- to Medium Business market.

Some points to consider:

• Many solutions require expensive hardware that only makes sense for large enterprises. @TheOffice.Wherever! requires no hardware other than standard desktop computers.

• Some solutions work with a dialup connections - this can become very expensive, especially when connecting from overseas. @TheOffice.Wherever! uses any Internet Connection. With the ever-increasing presence of Internet Connectivity (WiFi Hotspots, Hotel Rooms) this makes great sense.

• While other products might let you connect to a remote PC, @TheOffice.Wherever! puts you in the office. Road Warriors, for instance, quite often have a single Notebook that they take with them on the road. They need to have this Notebook in the office, even when out of the office. Remote desktop applications will still work perfectly with @TheOffice.Wherever!.

• Our flexible Subscription Model caters for your changing requirements. If you need extra users for a limited time only, you can purchase the additional capacity for a specified time.

• Many of the more expensive solutions require expert IT skills to configure it properly. We have taken the greatest care to make Remote Access as simple as possible to configure, without any compromise on security. For instance, @TheOffice integrates with your existing Windows Domain. Permissions are checked against your normal Domain Users by default. No additional access lists to create or maintain!

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Trispen Technologies
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2010-05-27
Owner
michelemjordan
Created
2010-05-27
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
    • - Endpoint Anti Spam
    • - Endpoint Anti Spyware
    • - Endpoint Anti-Virus
    • - Endpoint Forensics
    • - Endpoint Device Control
    • - Full Disk Encryption
    • - Desktop Firewall Software
    • - Host IDS
    • - Host IPS
    • - Host DLP
    • - Application IDS
    • - File Integrity Checkers
    • - VPN Clients
    • - Content Filters
    • - Mobile Devices
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message