IT Systems  >   Communications Networks  >   VPN  >  

SSL Remote Access

RSS Feed    Add to Google    Add to My Yahoo!
SSL Remote AccessReports
 
12 things effective intrusion prevention systems should do
sponsored by Dell Software
WHITE PAPER: Do you know what to look for in an intrusion protection system? Read our e-book, "12 Things Effective Intrusion Protection Systems Should Do," and learn to detect and block the latest generation of exploits used to attack computer systems and resist the most sophisticated evasion techniques.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

Dell Software

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Securing the Everywhere Network
sponsored by SonicWALL
WHITE PAPER: Everywhere networking streamlines facilities and energy costs, eliminates commuting time and expenses, builds global business partnerships, broadens markets and staffing pools and shortens customer response times.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

SonicWALL

Next-gen Load Balancing: Delivering Advanced Web Apps
sponsored by Citrix
WHITE PAPER: The increasing demands for high availability, reliability and security of application access are driving the need for load balancers to provide a comprehensive set of network level and application-level services. Read this paper to learn more.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Food Manufacturer Extends Its Workforce with Secure Remote Access
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition.
Posted: 08 Jul 2008 | Published: 01 Apr 2008

Cisco Systems, Inc.

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007
sponsored by F5 Networks
WHITE PAPER: One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution.
Posted: 28 Apr 2008 | Published: 01 Nov 2007

F5 Networks

Potomac Hospital Case Study
sponsored by SonicWALL
CASE STUDY: In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
Posted: 15 Nov 2007 | Published: 01 Jun 2007

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement