Standards  >   Network Protocols  >   TCP/IP  >  

IKE (Internet Key Exchange)

RSS Feed    Add to Google    Add to My Yahoo!
IKE (Internet Key Exchange) Reports
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

IT in Europe: Taking control of smartphones: Are MDMs up to the task?
sponsored by SearchSecurity.com
EZINE: In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

SearchSecurity.com

Computer Weekly – 28 March 2017: Making the UK fit for 5G
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the government's new 5G strategy and assess whether it's enough to stimulate development of next-generation mobile networks. We meet some of the Silicon Valley startups hoping to revolutionise big data. And we examine how to prevent the move to DevOps from harming work-life balance. Read the issue now.
Posted: 27 Mar 2017 | Published: 28 Mar 2017

ComputerWeekly.com

Exploring the Business Benefits of a SIP Solution
sponsored by Level 3 Communications, Inc.
EBOOK: This short e-book discusses the 3 key business benefits of embracing a SIP deployment in your enterprise.
Posted: 10 Mar 2016 | Published: 31 Dec 2014

Level 3 Communications, Inc.

CW Benelux ezine May-July 2016
sponsored by ComputerWeekly.com
EZINE: Welcome to the first Computer Weekly ezine focused on the Benelux region. This quarterly publication will look at the issues facing CIOs in Belgium, The Netherlands and Luxemburg.
Posted: 16 May 2016 | Published: 16 May 2016

ComputerWeekly.com

CW Benelux - May 2017: 3D printing on the rise
sponsored by ComputerWeekly.com
EZINE: Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.
Posted: 05 May 2017 | Published: 04 May 2017

ComputerWeekly.com

Guide: Migrating from Windows XP to Windows 7
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.
Posted: 16 Jul 2012 | Published: 05 Nov 2011

ComputerWeekly.com

Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now.
Posted: 10 Feb 2017 | Published: 14 Feb 2017

ComputerWeekly.com

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Security Threat Report: 2010
sponsored by Sophos, Inc.
WHITE PAPER: The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
Posted: 01 Apr 2010 | Published: 02 Mar 2010

Sophos, Inc.

EVault Remote Disaster Recovery
sponsored by i365, makers of Evault
PRODUCT REVIEW: EVault Remote Disaster Recovery Service (RDR) is a hosted service to help you quickly recover your key servers and data after a site disaster, and remotely access them in a secure virtual environment.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

i365, makers of Evault

IMS Interconnect: Peering, Roaming and Security - Part Two
sponsored by Alcatel-Lucent
PRODUCT LITERATURE: Read this white paper for an overview of IMS Interconnect and the security considerations to address in order to achieve the proper balance of access and security.
Posted: 10 Sep 2007 | Published: 01 Feb 2007

Alcatel-Lucent

The Move Toward IT Service Management (ITSM) Mobilization
sponsored by BlackBerry
ANALYST REPORT: IDG Research Services recently surveyed more than 200 CIOs and senior IT and business executives at companies of all sizes to examine the benefits of giving employees mobile access to strategic business applications, including ITSM applications. This analyst report discusses the benefits of ITSM mobilization and key findings from the IDG survey.
Posted: 17 Feb 2010 | Published: 17 Feb 2010

BlackBerry

Computer Weekly: Quantum Computing Drives the Future for Volkswagen
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Volkswagen's global CIO explains how the car giant is using quantum computing to drive the future of transport. We examine how to make data analytics programmes work and deliver business value. And SAP's CEO reacts to controversy around the supplier's software licensing policies. Read the issue now.
Posted: 26 May 2017 | Published: 26 May 2017

ComputerWeekly.com

CW Middle East: UAE faces IT recruitment challenge
sponsored by ComputerWeekly.com
EZINE: As a measure of the progress of technology in the region, we quickly move into the world of flying cars in this issue with a look at plans from the Dubai Roads and Transport Authority (RTA) to launch autonomous aerial vehicles in July this year.
Posted: 07 Apr 2017 | Published: 13 Apr 2017

ComputerWeekly.com

Networking and Unified Communications Reference Guide
sponsored by CDW Corporation
ESSENTIAL GUIDE: CDW is committed to getting you everything you need to make the right purchasing decisions — from products and services to information about the latest technology. This reference guides is designed to provide you with an in-depth look at Networking and unified communications as they relate to the IT challenges your organization faces.
Posted: 08 Sep 2009 | Published: 01 Sep 2009

CDW Corporation

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs
sponsored by NetMotion Wireless
WHITE PAPER: This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.
Posted: 27 Jun 2008 | Published: 01 Jun 2008

NetMotion Wireless

SSL VPN Technical Primer
sponsored by Aventail | SonicWall
WHITE PAPER: SSL VPNs provide remote users with easy-to-use, secure access to applications and resources on the network while minimizing associated risks and significantly lowering administration and support costs. Find out how your company can benefit.
Posted: 29 Aug 2007 | Published: 01 Aug 2007

Aventail | SonicWall

Bitcoin, App Security, and Oracle's Controversial Licensing Policies
sponsored by ComputerWeekly.com
EZINE: Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
Posted: 21 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
Posted: 13 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

The CIO's Unified Communications Checklist
sponsored by MASERGY
RESOURCE: This short resource discusses the selection criteria and management focus of unified communications as a potential tool for enterprises. Further, you'll learn to about selecting the right UCaaS tool for your particular management needs.
Posted: 15 Jul 2016 | Published: 18 Mar 2016

TOPICS:  CIOs | Collaboration
MASERGY

Focus: Agile DevOps
sponsored by ComputerWeekly.com
EGUIDE: Businesses in every industry are finding themselves under pressure to out-innovate their competitors, and push out new products and services to customers at an ever-increasing rate.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ComputerWeekly.com

Wireless LAN Security - What Hackers Know That You Don't
sponsored by AirDefense Inc.
WHITE PAPER: What do hackers know that you don't? An understanding of the latest hacker techniques will help you take proactive steps to secure your wireless networks. This white paper examines methods, skills and tools hackers use to exploit vulnerabilities.
Posted: 07 Nov 2002 | Published: 31 Dec 2005

AirDefense Inc.

Control Scan
sponsored by Unisys
WHITE PAPER: Access this white paper now to get the full results of ControlScan's test of one vendor's top security solution. Discover the strengths and weaknesses of this platform and discover if it is a viable option for your organization.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement