IT Systems  >   Communications Networks  >   VPN  >  

Secure Sockets Layer VPN

RSS Feed    Add to Google    Add to My Yahoo!
Secure Sockets Layer VPN Reports
 
Emerging SSL threats: New techniques and countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about specific methods attackers are using to exploit SSL and how to defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

TOPICS:  SSL | SSL VPN
SearchSecurity.com

Potomac Hospital Case Study
sponsored by SonicWALL
CASE STUDY: In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
Posted: 15 Nov 2007 | Published: 01 Jun 2007

SonicWALL

Food Manufacturer Extends Its Workforce with Secure Remote Access
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition.
Posted: 08 Jul 2008 | Published: 01 Apr 2008

Cisco Systems, Inc.

Locking down Mobile Data
sponsored by BlackBerry
WHITE PAPER: This document is based on a BlackBerry/TechTarget webcast entitled "Locking Down Mobile Data."
Posted: 10 May 2008 | Published: 01 May 2008

BlackBerry

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

SSL VPN Technical Primer
sponsored by Aventail | SonicWall
WHITE PAPER: SSL VPNs provide remote users with easy-to-use, secure access to applications and resources on the network while minimizing associated risks and significantly lowering administration and support costs. Find out how your company can benefit.
Posted: 29 Aug 2007 | Published: 01 Aug 2007

Aventail | SonicWall

Enabling Carrier-class Communications with EX Switches
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.
Posted: 21 Oct 2008 | Published: 21 Oct 2008

Juniper Networks, Inc.

Simple Steps to Securing Your SSL VPN
sponsored by SonicWALL
WHITE PAPER: This expert eBook features a quiz that helps test your knowledge of IPsec vs. SSL VPNs and details additional resources that help you determine which technology best suits your organization's needs.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Securing microsoft exchange 2010 With Thawte SSL Certificates
sponsored by Thawte Inc.
WHITE PAPER: Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010.
Posted: 27 Jul 2011 | Published: 12 Jul 2011

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement