IT Systems  >   Communications Networks  >   VPN  >  

SSL Virtual Private Networks

RSS Feed    Add to Google    Add to My Yahoo!
SSL Virtual Private Networks Reports
 
How Aventail SSL VPNs Test against Leading IPSec Solutions: A Head-to-Head Review Comparing Cisco, Sonicwall, and Aventail VPNs
sponsored by Aventail
WHITE PAPER: An Aventail SSL VPN is designed to deliver clientless access to any application, from any location, making it the first SSL VPN that can replace IPSec VPNs for any remote access need.
Posted: 23 Oct 2005 | Published: 01 Oct 2005

Aventail

Application Brief: Multi-tenant Cloud Security
sponsored by Vyatta Inc.
APPLICATION NOTE: Multitenant cloud security is a critical concern for cloud service providers and end users alike. One significant challenge involves maintaining compliance to corporate and regulatory standards, while leveraging the shared infrastructure model’s cost benefits and improved operational efficiency.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Vyatta Inc.

Next-gen Load Balancing: Delivering Advanced Web Apps
sponsored by Citrix
WHITE PAPER: The increasing demands for high availability, reliability and security of application access are driving the need for load balancers to provide a comprehensive set of network level and application-level services. Read this paper to learn more.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Enterprise Remote Access
sponsored by F5 Networks
WHITE PAPER: Historically, organizations have used IPSec VPN solutions to provide employees with remote access to network resources; an expensive, complicated deployment for a handful of users. This paper details how this process has modernized.
Posted: 28 Apr 2008 | Published: 01 Sep 2005

F5 Networks

How SSL and TLS Secure Network Transactions
sponsored by GeoTrust, Inc.
EGUIDE: This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!
Posted: 27 Dec 2012 | Published: 20 Dec 2012

GeoTrust, Inc.

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007
sponsored by F5 Networks
WHITE PAPER: One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution.
Posted: 28 Apr 2008 | Published: 01 Nov 2007

F5 Networks

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.

How SSL and TLS Secure Network Transactions
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Symantec & Blue Coat Systems

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Cisco 1800 Series integrated services routers are the next evolution of the award-winning Cisco 1700 Series modular access routers.
Posted: 10 Jul 2008 | Published: 01 Jun 2007

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement