IT Services  >   Telecommunications Services  >  

IP VPN Services

RSS Feed    Add to Google    Add to My Yahoo!
IP VPN ServicesReports
 
Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

ComputerWeekly.com

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com

Controlling laptop and smartphone access to corporate networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information flow, but can serve as a vehicle for malware and other security threats. Companies that rely on RDP solutions are more susceptible, because they may only support weak encryption standards. Find out how your IT department can scan all traffic to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

Single Point of Access, Single Point of Control
sponsored by Citrix
WHITE PAPER: Read on to learn how desktop virtualization can help support remote connectivity better than VPN.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

Citrix

The Great Multi Protocol Label Switching (MPLS) Migration
sponsored by SingTel
WHITE PAPER: This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

SingTel

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

E-Guide: MPLS VPN basics
sponsored by MegaPath Inc.
EGUIDE: This e-guide discusses the ins and outs of MPLS VPNs and traditional virtual private networks. Uncover the differences, advantages and disadvantages of each one.
Posted: 31 May 2011 | Published: 31 May 2011

MegaPath Inc.

Proper use of VPN and RPC/HTTPS
sponsored by F5 Networks
EGUIDE: Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

F5 Networks

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

WAN and VPN Solutions: Choosing the Best Type for your Organization
sponsored by XO Communications
WHITE PAPER: This whitepaper describes the different WAN and VPN options organizations have, and helps you figure out which would be the best for your particular needs.
Posted: 08 Mar 2012 | Published: 07 Mar 2012

XO Communications
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement