IT Systems  >   Communications Networks  >   VPN  >  

Secure Sockets Layer VPN

RSS Feed    Add to Google    Add to My Yahoo!
Secure Sockets Layer VPN Reports
 
Emerging SSL threats: New techniques and countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about specific methods attackers are using to exploit SSL and how to defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

TOPICS:  SSL | SSL VPN
SearchSecurity.com

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Secure Remote Access
sponsored by RSA
BROCHURE: This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...
Posted: 27 Sep 2007 | Published: 26 Sep 2007

RSA

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Symantec Corporation

Making the Right Move to a Managed Service Provider for SSL VPN
sponsored by MegaPath Inc.
WHITE PAPER: Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Cisco 1800 Series integrated services routers are the next evolution of the award-winning Cisco 1700 Series modular access routers.
Posted: 10 Jul 2008 | Published: 01 Jun 2007

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement