IT Systems  >   Communications Networks  >  

Virtual Private Networks

RSS Feed    Add to Google    Add to My Yahoo!
Virtual Private NetworksWhite Papers (View All Report Types)
 
Controlling laptop and smartphone access to corporate networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information flow, but can serve as a vehicle for malware and other security threats. Companies that rely on RDP solutions are more susceptible, because they may only support weak encryption standards. Find out how your IT department can scan all traffic to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

Service Provider MPLS VPN Security Considerations
sponsored by Certes Networks
WHITE PAPER: This report explores security considerations for service provider MPLS VPN, and describes two threat scenarios against a real MPLS VPN environment that was constructed to demonstrate the typical attack surface of an MPLS Layer 3 VPN provider network.
Posted: 27 Oct 2011 | Published: 01 Sep 2011

Certes Networks

Integrating Mobile Access into Your VPN Environment
sponsored by AT&T Corp
WHITE PAPER: Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
Posted: 31 May 2007 | Published: 07 Jun 2006

AT&T Corp

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

VPLS: The Switched Ethernet
sponsored by AT&T Corp
WHITE PAPER: Virtual Private LAN Service is evolving into the next "in" technology. AT&T defines it as any-to-any Ethernet that can be either metro or long haul. VPLS allows enterprises to scale bandwidth and is a good fit for customers who require meshed connectivity and want to control and manage routing.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 17 Jan 2011 | Published: 17 Jan 2011

Copiun

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

The MPLS Network: A Future-Proof Engine for Voice-Data Convergence
sponsored by MegaPath Inc.
WHITE PAPER: Voice and data on a single wire is an exciting network development. MPLS technology, which enables voice and data to be transported together on wide area networks (WANs), has matured to provide a platform for almost unimaginable communications and cloud computing possibilities. Learn more about MPLS by reading this white paper.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.

Siemens Mobile UC - Where UC Meets Enterprise Mobility
sponsored by Siemens Enterprise Communications
WHITE PAPER: In response to increased employee mobility, companies are developing Unified Communications (UC) strategies and implementing UC solutions to enable a global work focus and ease employee communications problems.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Siemens Enterprise Communications

Making the Right Move to a Managed Service Provider for SSL VPN
sponsored by MegaPath Inc.
WHITE PAPER: Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement