sponsored by ComputerWeekly.com
Posted:  25 Oct 2011
Published:  10 Nov 2010
Format:  PDF
Length:  2  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:


How you make a secure, trusted connection over the Internet is one of the key debates as the industry strives for de-perimeterised solutions that it can implement. To the charge that the protocols they are using are inherently insecure; the un-enlightened reply from the industry is “no problem we can encapsulate it in a VPN tunnel”, to which usually they mean an IPSec tunnel






BROWSE RELATED RESOURCES
Risk Assessment | Risk Management | Security

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement