Standards  >   Security Standards  >  

Internet Protocol Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Protocol SecurityReports
 
E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

IMS Interconnect: Peering, Roaming and Security - Part Two
sponsored by Alcatel-Lucent
PRODUCT LITERATURE: Read this white paper for an overview of IMS Interconnect and the security considerations to address in order to achieve the proper balance of access and security.
Posted: 10 Sep 2007 | Published: 01 Feb 2007

Alcatel-Lucent

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

How to Extend your Virtual Private Network with Citrix GoToMyPC Corporate
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Read this white paper to learn how companies can deliver more effective remote access by augmenting their traditional VPN with Web-based technologies.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

IPSec Vs SSL VPN for Secure Remote Access
sponsored by Aventail | SonicWall
WHITE PAPER: IPSec or SSL VPN: Which is right for your business? This paper compares these two technologies in terms of access control for unmanaged end points, support for a full range of applications, end user ease-of-use, and more.
Posted: 09 Aug 2007 | Published: 01 Jan 2005

Aventail | SonicWall

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

15 Minutes to Complete Data Protection
sponsored by CipherOptics
WHITE PAPER: Increasingly, data is the most important asset a company owns. Protecting this data used to mean costly configurations that resulted in increased latency and network speed. This paper examines ways to protect this valuable data in just 15 minutes.
Posted: 13 Mar 2006 | Published: 31 Dec 2005

CipherOptics

SingTel IP VPN Manufacturing Industry
sponsored by Do Not Use - Singapore Telecommunications Ltd
WHITE PAPER: IP VPN technology is a viable solution for manufacturing companies seeking to weave their operations into the rapidly changing industry. It has unleashed a new era of IT infrastructure and this white paper provides the details.
Posted: 30 May 2008 | Published: 01 Nov 2007

Do Not Use - Singapore Telecommunications Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement