IT Systems  >   Communications Networks  >  

VPNs

RSS Feed    Add to Google    Add to My Yahoo!
VPNsWhite Papers (View All Report Types)
 
Carrier Ethernet: Transforming Business Telecommunications
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper elucidates the process of selecting the best services for your organization's WAN needs, including Private Line, Layer 2 VPNs, and Layer 3 VPNs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

Unified Threat Management: The security you need, the simplicity you want
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot.
Posted: 08 Sep 2008 | Published: 08 Sep 2008

Check Point Software Technologies Ltd.

Enabling the Profitable Evolution of Mobile Transport to All-IP
sponsored by Alcatel-Lucent
WHITE PAPER: The mobile transport network is one of the key considerations for mobile service providers planning a network transformation. This paper outlines the challenges associated with transforming the mobile transport network and presents the Alcatel-Lucent approach to effective transformation.
Posted: 03 Mar 2009 | Published: 03 Mar 2009

Alcatel-Lucent

Optimizing WAN Performance: Accelerating Market Growth
sponsored by Burton Group
WHITE PAPER: This report, updated by Senior Analyst Eric Siegel, describes cost-effective bandwidth optimization techniques such as compression and caching along with protocol optimization techniques and wide-area file services (WAFS) technologies.
Posted: 18 Apr 2008 | Published: 03 Jan 2006

Burton Group

The Future of Business-Critical Networking
sponsored by Cavalier
WHITE PAPER: Your network must deliver non-stop services to support business operations and be highly scalable to support future growth. It must also address multiple communications needs cost-effectively and flexibly. The communications network must meet the demands of a dynamic business-critical environment. Read this white paper to learn more.
Posted: 20 May 2010 | Published: 20 May 2010

Cavalier

Deliver Application-level Security at Data Center Performance Levels
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security.
Posted: 08 Sep 2008 | Published: 08 Sep 2008

Check Point Software Technologies Ltd.

Optimizing WAN Performance for the Global Enterprise
sponsored by Intel Corporation
WHITE PAPER: WAN performance is critical to enterprise business around the globe. Read this white paper to learn the latest WAN optimization technologies, market products available for optimizations and analyst recommended WAN best practices.
Posted: 31 Aug 2007 | Published: 01 May 2006

Intel Corporation

Three Steps for Creating a Mobility Strategy
sponsored by AT&T Corp
WHITE PAPER: Many organizations have implemented mobility in a tactical and piecemeal manner, not realizing the gains possible from adopting a more strategic approach. This paper explains how to conduct a mobility audit, review your business activities and develop an effective mobility implementation plan.
Posted: 13 Oct 2010 | Published: 13 Oct 2010

AT&T Corp

Mobile NAC: Protecting Network Security by Protecting Mobile Endpoints
sponsored by Fiberlink Communications
WHITE PAPER: This white paper discusses a new approach to Network Access Control that overcomes both of these shortcomings of conventional NAC products.
Posted: 05 Jun 2008 | Published: 05 Jun 2008

Fiberlink Communications

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks
sponsored by IronKey
WHITE PAPER: Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

IronKey
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement