IT Systems  >   Communications Networks  >  

VPN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 
Definition continues below.
VPN Reports
1 - 25 of 156 Matches Previous Page  |  Next Page
Putting The UX Into VPN
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about the challenges associated with current VPN technology. Discover a VPN authentication platform designed to give customers a simplified, more secure VPN.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

Go With the Flow: Keeping Your Staff at Their Most Productive
sponsored by USU AG
WEBCAST: This informative webinar, featuring analysts from Gartner, outlines how to keep your staff at their most productive – in their "flow" zone. Tune in to learn how to make sure your businesses processes running and systems like VPN running smoothly.
Posted: 10 Jul 2015 | Premiered: Jun 25, 2015

USU AG

Productivity at Last: How to Safely Set your Mobile Workers Free
sponsored by BlackBerry
WEBCAST: Access this webcast to learn how to implement mobile solutions that overcome challenges such as VPN connectivity, collaboration application security and cross-platform content management to achieve the productivity benefits you want.
Posted: 09 Jul 2015 | Premiered: Jul 9, 2015

BlackBerry

Peer 1 Hosting Research
sponsored by Peer1
RESOURCE: This survey is designed to profile current practices and perceptions of cloud platforms. Click through now to get started on this evaluation.
Posted: 02 Jul 2015 | Published: 30 Jun 2015

Peer1

The WAN’S New Role in Distributed Enterprises
sponsored by Talari Networks
EGUIDE: Download and discover how the WAN's role in distributed enterprises is evolving and how your MPLS solution fits into the situation.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Talari Networks

Keep Corporate Data Secure in a BYOD World
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this expert eGuide to learn the secrets of securing your data from the three common threat vectors by ensuring you have the right VPN features.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Dell, Inc. and Intel®

Establishing an MPLS VPN Foothold with Private IP
sponsored by Verizon
WHITE PAPER: Access this white paper to learn how Verizon is establishing a foothold in the MPLS VPN market with private IPs.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Verizon

Peer 1 On Demand Cloud Platform™. For True Native Hybrid Cloud™
sponsored by Peer1
DATA SHEET: View this informative white paper to learn about an on demand cloud platform that enables you to provision complex True Native Hybrid Cloud™ solutions in just minutes from a single, intuitive control panel.
Posted: 11 May 2015 | Published: 11 May 2015

Peer1

Up and running in an instant. No contract, no capex, no delay.
sponsored by Peer1
WHITE PAPER: This white paper highlights an on demand cloud platform that delivers business agility, ease of use and outstanding value.
Posted: 06 May 2015 | Published: 06 May 2015

Peer1

Securely connect and communicate around the world
sponsored by Verizon
WHITE PAPER: Access this white paper to discover an MPLS-based private IP service that provides highly scalable connectivity options, simple any-to-any network design, and can consolidate applications onto a single infrastructure.
Posted: 19 Feb 2015 | Published: 31 Dec 2013

Verizon

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Taking Authentication Beyond Passwords for Secure Always-On Mobile Access
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Deliver Simple and Secure Access to Behind-the-Firewall Business Resources
sponsored by IBM
WHITE PAPER: Learn the ins-and-outs of a solution capable of delivering simple and secure access to behind-the-firewall business resources such as Windows File Share content and intranet sites without requiring changes to your network, firewall security configuration or device VPN.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Bringing Your Corporate Content and Apps into the Mobile Era
sponsored by IBM
WHITE PAPER: This white paper explores how organizations can embrace, plan, and deploy a comprehensive mobile strategy that harnesses the power of mobility with secure access to business resources.
Posted: 22 Jul 2014 | Published: 29 Jul 2011

IBM

Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Agility in the Data Center
sponsored by SearchDataCenter.com
EBOOK: By choosing to adopt SDN, admins can make their IT teams as more agile.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchDataCenter.com

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Minimise the Security Risks of Mobile Email Access
sponsored by Hewlett-Packard Limited
EGUIDE: This expert e-guide will teach you how to put airtight security measures on remote e-mail access.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

ComputerWeekly.com
1 - 25 of 156 Matches Previous Page    1 2 3 4    Next Page
 
VPN DEFINITION (continued): …  for home and small-business computer users. A traditional VPN is, essentially, a set of programs on the same platform as the network operating system. Such a VPN provides remote offices or individual users with secure access to their organization's network by using the shared public telecommunications infrastructure and standard security measures. Hardware VPNs offer a number of advantages over the software-based VPN. In addition to enhanced security, hardware VPNs provide load balancing and the ability to handle large client loads. Administration is managed through a Web browser interface. A … 
VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement