IT Systems  >   Communications Networks  >   VPN  >  

Secure Socket Layer VPN

RSS Feed    Add to Google    Add to My Yahoo!
Secure Socket Layer VPN Reports
 
E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007
sponsored by F5 Networks
WHITE PAPER: One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution.
Posted: 28 Apr 2008 | Published: 01 Nov 2007

F5 Networks

Why SSL VPN Still Matters
sponsored by F5 Networks
WHITE PAPER: This resource showcases a two-pronged approach to secure remote access afforded by SSL VPN solutions, which provide comprehensive security and mobile access for all devices running Android. Find out why SSL VPN will continue to be important to corporate remote access strategies.
Posted: 15 Nov 2013 | Published: 13 Jan 2012

F5 Networks

SSL VPN for Secure Wireless LAN Access
sponsored by F5 Networks
WHITE PAPER: For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell...
Posted: 28 Apr 2008 | Published: 01 Oct 2007

F5 Networks

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

Secure Remote Access
sponsored by RSA
BROCHURE: This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...
Posted: 27 Sep 2007 | Published: 26 Sep 2007

RSA

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

How to Protect Your Critical Resources with Identity-based Access Control
sponsored by AEP Networks
WHITE PAPER: This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges.
Posted: 23 Apr 2008 | Published: 01 Apr 2008

AEP Networks

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Enabling Carrier-class Communications with EX Switches
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.
Posted: 21 Oct 2008 | Published: 21 Oct 2008

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement