Standards  >   Security Standards  >  

IP Security Protocol

RSS Feed    Add to Google    Add to My Yahoo!
IP Security ProtocolReports
 
E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

IMS Interconnect: Peering, Roaming and Security - Part Two
sponsored by Alcatel-Lucent
PRODUCT LITERATURE: Read this white paper for an overview of IMS Interconnect and the security considerations to address in order to achieve the proper balance of access and security.
Posted: 10 Sep 2007 | Published: 01 Feb 2007

Alcatel-Lucent

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Embracing Microsoft Vista for Enhanced Network Security
sponsored by Lumeta Corporation
WHITE PAPER: This white paper examines the steps to take when migrating and implementing Windows Vista and discusses how to mitigate risks, reduce costs and improve overall security.
Posted: 08 Mar 2007 | Published: 01 Mar 2007

Lumeta Corporation

IPSec Vs SSL VPN for Secure Remote Access
sponsored by Aventail | SonicWall
WHITE PAPER: IPSec or SSL VPN: Which is right for your business? This paper compares these two technologies in terms of access control for unmanaged end points, support for a full range of applications, end user ease-of-use, and more.
Posted: 09 Aug 2007 | Published: 01 Jan 2005

Aventail | SonicWall

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Cisco 1800 Series integrated services routers are the next evolution of the award-winning Cisco 1700 Series modular access routers.
Posted: 10 Jul 2008 | Published: 01 Jun 2007

Cisco Systems, Inc.

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement