IP Security Protocol White Papers

(View All Report Types)
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

SingTel IP VPN Manufacturing Industry
sponsored by Do Not Use - Singapore Telecommunications Ltd
WHITE PAPER: IP VPN technology is a viable solution for manufacturing companies seeking to weave their operations into the rapidly changing industry. It has unleashed a new era of IT infrastructure and this white paper provides the details.
Posted: 30 May 2008 | Published: 01 Nov 2007

Do Not Use - Singapore Telecommunications Ltd

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
sponsored by Verizon
WHITE PAPER: This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
Posted: 08 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation