The Virtual Office Checklist

The Virtual Office Checklist

Cover
The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.

VPNs use secure firewalls and well-tested security measures at every network point of entry, to help stop worms, spyware, or hackers from attempting to disrupt your business network or steal sensitive information.
Vendor:
Cisco Systems, Inc.
Posted:
10 Oct 2008
Published:
10 Oct 2008
Format:
PDF
Length:
1 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.