IT Systems  >   Communications Networks  >   VPN  >  

Secure Socket Layer VPN

RSS Feed    Add to Google    Add to My Yahoo!
Secure Socket Layer VPNWhite Papers (View All Report Types)
 
Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Locking down Mobile Data
sponsored by BlackBerry
WHITE PAPER: This document is based on a BlackBerry/TechTarget webcast entitled "Locking Down Mobile Data."
Posted: 10 May 2008 | Published: 01 May 2008

BlackBerry

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Next-gen Load Balancing: Delivering Advanced Web Apps
sponsored by Citrix
WHITE PAPER: The increasing demands for high availability, reliability and security of application access are driving the need for load balancers to provide a comprehensive set of network level and application-level services. Read this paper to learn more.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

The Hidden Challenges of Securing a Virtual Environment
sponsored by Stonesoft Inc.
WHITE PAPER: The purpose of this paper is to arm security professionals and IT leaders with a solid understanding of the potential risks of not incorporating new security technologies into their virtual environments.
Posted: 07 Mar 2008 | Published: 01 Feb 2008

Stonesoft Inc.

How to Protect Your Critical Resources with Identity-based Access Control
sponsored by AEP Networks
WHITE PAPER: This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges.
Posted: 23 Apr 2008 | Published: 01 Apr 2008

AEP Networks

The Anytime, Anyplace World: Choosing the Right Mobile Connectivity Strategy for Your Enterprise
sponsored by Nokia
WHITE PAPER: From the globetrotting CEO to the roving field engineer, portable devices such as mobile phones, laptop computers, and business devices have radically changed the way people work.
Posted: 07 Jan 2008 | Published: 01 Jan 2006

Nokia

How Aventail SSL VPNs Test against Leading IPSec Solutions: A Head-to-Head Review Comparing Cisco, Sonicwall, and Aventail VPNs
sponsored by Aventail
WHITE PAPER: An Aventail SSL VPN is designed to deliver clientless access to any application, from any location, making it the first SSL VPN that can replace IPSec VPNs for any remote access need.
Posted: 23 Oct 2005 | Published: 01 Oct 2005

Aventail

Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER: This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement