IT Systems  >   Communications Networks  >   VPN  >  

SSL Virtual Private Networks

RSS Feed    Add to Google    Add to My Yahoo!
SSL Virtual Private NetworksReports
 
How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

IPSec Vs SSL VPN for Secure Remote Access
sponsored by Aventail | SonicWall
WHITE PAPER: IPSec or SSL VPN: Which is right for your business? This paper compares these two technologies in terms of access control for unmanaged end points, support for a full range of applications, end user ease-of-use, and more.
Posted: 09 Aug 2007 | Published: 01 Jan 2005

Aventail | SonicWall

Enterprise Remote Access
sponsored by F5 Networks
WHITE PAPER: Historically, organizations have used IPSec VPN solutions to provide employees with remote access to network resources; an expensive, complicated deployment for a handful of users. This paper details how this process has modernized.
Posted: 28 Apr 2008 | Published: 01 Sep 2005

F5 Networks

The Anytime, Anyplace World: Choosing the Right Mobile Connectivity Strategy for Your Enterprise
sponsored by Nokia
WHITE PAPER: From the globetrotting CEO to the roving field engineer, portable devices such as mobile phones, laptop computers, and business devices have radically changed the way people work.
Posted: 07 Jan 2008 | Published: 01 Jan 2006

Nokia

Ten Remote Access Tips in Ten Minutes
sponsored by ProCurve Networking by HP
WHITE PAPER: This briefing will provide 10 quick tips for locking down remote endpoints and safeguarding the corporate data that they carry and send.
Posted: 06 Apr 2006 | Published: 01 Apr 2006

ProCurve Networking by HP

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Evaluation Criteria for SSL VPN Appliance
sponsored by Aventail
PRODUCT LITERATURE: Organizations should be aware that many secure remote access solutions offer only a few of the capabilities that today's mature SSL VPN technology enables.
Posted: 24 Oct 2006 | Published: 01 Oct 2006

Aventail

Secure Remote Access
sponsored by RSA, The Security Division of EMC
BROCHURE: This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...
Posted: 27 Sep 2007 | Published: 26 Sep 2007

RSA, The Security Division of EMC

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement