Standards  >   Security Standards  >  

I P Sec

RSS Feed    Add to Google    Add to My Yahoo!
I P SecReports
 
E-Guide: Best Practices to ensure secure mobile communication
sponsored by Thawte Inc.
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

Thawte Inc.

Embracing Microsoft Vista for Enhanced Network Security
sponsored by Lumeta Corporation
WHITE PAPER: This white paper examines the steps to take when migrating and implementing Windows Vista and discusses how to mitigate risks, reduce costs and improve overall security.
Posted: 08 Mar 2007 | Published: 01 Mar 2007

Lumeta Corporation

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Cisco 1800 Series integrated services routers are the next evolution of the award-winning Cisco 1700 Series modular access routers.
Posted: 10 Jul 2008 | Published: 01 Jun 2007

Cisco Systems, Inc.

IPSec Vs SSL VPN for Secure Remote Access
sponsored by Aventail | SonicWall
WHITE PAPER: IPSec or SSL VPN: Which is right for your business? This paper compares these two technologies in terms of access control for unmanaged end points, support for a full range of applications, end user ease-of-use, and more.
Posted: 09 Aug 2007 | Published: 01 Jan 2005

Aventail | SonicWall

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

15 Minutes to Complete Data Protection
sponsored by CipherOptics
WHITE PAPER: Increasingly, data is the most important asset a company owns. Protecting this data used to mean costly configurations that resulted in increased latency and network speed. This paper examines ways to protect this valuable data in just 15 minutes.
Posted: 13 Mar 2006 | Published: 31 Dec 2005

CipherOptics

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

IMS Interconnect: Peering, Roaming and Security - Part Two
sponsored by Alcatel-Lucent
PRODUCT LITERATURE: Read this white paper for an overview of IMS Interconnect and the security considerations to address in order to achieve the proper balance of access and security.
Posted: 10 Sep 2007 | Published: 01 Feb 2007

Alcatel-Lucent

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement