Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

VPN Concentrators

RSS Feed    Add to Google    Add to My Yahoo!
VPN ConcentratorsReports
 
IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

SSL VPN Technical Primer
sponsored by Aventail | SonicWall
WHITE PAPER: SSL VPNs provide remote users with easy-to-use, secure access to applications and resources on the network while minimizing associated risks and significantly lowering administration and support costs. Find out how your company can benefit.
Posted: 29 Aug 2007 | Published: 01 Aug 2007

Aventail | SonicWall

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSec Vs SSL VPN for Secure Remote Access
sponsored by Aventail | SonicWall
WHITE PAPER: IPSec or SSL VPN: Which is right for your business? This paper compares these two technologies in terms of access control for unmanaged end points, support for a full range of applications, end user ease-of-use, and more.
Posted: 09 Aug 2007 | Published: 01 Jan 2005

Aventail | SonicWall

Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER: This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

The Business Platform Choice: Delivering IT - Business Integration with IPVPN
sponsored by SingTel
WHITE PAPER: This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

SingTel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement