Standards  >   Security Standards  >  

I P Sec

RSS Feed    Add to Google    Add to My Yahoo!
I P SecReports
 
IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Embracing Microsoft Vista for Enhanced Network Security
sponsored by Lumeta Corporation
WHITE PAPER: This white paper examines the steps to take when migrating and implementing Windows Vista and discusses how to mitigate risks, reduce costs and improve overall security.
Posted: 08 Mar 2007 | Published: 01 Mar 2007

Lumeta Corporation

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

E-Guide: Best Practices to ensure secure mobile communication
sponsored by Thawte Inc.
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

Thawte Inc.

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Cisco 1800 Series integrated services routers are the next evolution of the award-winning Cisco 1700 Series modular access routers.
Posted: 10 Jul 2008 | Published: 01 Jun 2007

Cisco Systems, Inc.

How to Extend your Virtual Private Network with Citrix GoToMyPC Corporate
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Read this white paper to learn how companies can deliver more effective remote access by augmenting their traditional VPN with Web-based technologies.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

SingTel IP VPN Manufacturing Industry
sponsored by Do Not Use - Singapore Telecommunications Ltd
WHITE PAPER: IP VPN technology is a viable solution for manufacturing companies seeking to weave their operations into the rapidly changing industry. It has unleashed a new era of IT infrastructure and this white paper provides the details.
Posted: 30 May 2008 | Published: 01 Nov 2007

Do Not Use - Singapore Telecommunications Ltd

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement