Standards  >   Security Standards  >  

IP Security

RSS Feed    Add to Google    Add to My Yahoo!
IP SecurityReports
 
Quick Guide SSL VPN Technical Primer
sponsored by Dell Software
WHITE PAPER: Use this primer to quickly find answers to many common questions about SSL VPNs, and understand the many advantages of this technology for secure mobile access.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

Dell Software

E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

IMS Interconnect: Peering, Roaming and Security - Part Two
sponsored by Alcatel-Lucent
PRODUCT LITERATURE: Read this white paper for an overview of IMS Interconnect and the security considerations to address in order to achieve the proper balance of access and security.
Posted: 10 Sep 2007 | Published: 01 Feb 2007

Alcatel-Lucent

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

How to Extend your Virtual Private Network with Citrix GoToMyPC Corporate
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Read this white paper to learn how companies can deliver more effective remote access by augmenting their traditional VPN with Web-based technologies.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

Embracing Microsoft Vista for Enhanced Network Security
sponsored by Lumeta Corporation
WHITE PAPER: This white paper examines the steps to take when migrating and implementing Windows Vista and discusses how to mitigate risks, reduce costs and improve overall security.
Posted: 08 Mar 2007 | Published: 01 Mar 2007

Lumeta Corporation

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement