IT Systems  >   Communications Networks  >  

VPN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps  … 
Definition continues below.
VPN Reports
1 - 25 of 154 Matches Previous Page  |  Next Page
The WAN’S New Role in Distributed Enterprises
sponsored by Talari Networks
EGUIDE: Download and discover how the WAN's role in distributed enterprises is evolving and how your MPLS solution fits into the situation.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Talari Networks

Keep Corporate Data Secure in a BYOD World
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this expert eGuide to learn the secrets of securing your data from the three common threat vectors by ensuring you have the right VPN features.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Dell, Inc. and Intel®

SSL VPN Products in the Enterprise and Mobile Security
sponsored by Pulse Secure
EGUIDE: Access this expert eGuide to discover how SSL VPNs successfully encrypt network communications, and how to implement a solution in your business.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Pulse Secure

Benefits And Criteria For Selecting The Right SSL VPN Products
sponsored by Pulse Secure
EGUIDE: Access this eGuide to learn the 4 key criteria for choosing the right SSL VPN for your business needs, and the key security benefits they can give you.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pulse Secure

Establishing an MPLS VPN Foothold with Private IP
sponsored by Verizon
WHITE PAPER: Access this white paper to learn how Verizon is establishing a foothold in the MPLS VPN market with private IPs.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Verizon

Enterprise Mobility Management Without Investing in a New Solution
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can activate the EMM capabilities of your existing virtual private network (VPN) so that you can successfully manage mobile devices without migrating to a new system.
Posted: 11 Jun 2015 | Published: 29 May 2015

Pulse Secure

Integrating MDM and NAC for Mobile Success
sponsored by Pulse Secure
WHITE PAPER: Read this white paper to discover how integrated VPN, access control, and mobile device management solutions deliver superior network security and BYOD productivity so that you can gain a competitive edge in the mobile business world.
Posted: 09 Jun 2015 | Published: 28 Aug 2015

Pulse Secure

Peer 1 On Demand Cloud Platform™. For True Native Hybrid Cloud™
sponsored by Peer1
DATA SHEET: View this informative white paper to learn about an on demand cloud platform that enables you to provision complex True Native Hybrid Cloud™ solutions in just minutes from a single, intuitive control panel.
Posted: 11 May 2015 | Published: 11 May 2015

Peer1

Up and running in an instant. No contract, no capex, no delay.
sponsored by Peer1
WHITE PAPER: This white paper highlights an on demand cloud platform that delivers business agility, ease of use and outstanding value.
Posted: 06 May 2015 | Published: 06 May 2015

Peer1

Agility in the Data Center
sponsored by SearchDataCenter.com
EBOOK: By choosing to adopt SDN, admins can make their IT teams as more agile.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchDataCenter.com

Efficient Cloud Connectivity Ensures Optimal Cloud Connection
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains the attraction to the cloud, and why many enterprises are now migrating their internal data center infrastructure and business applications to public and private clouds.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Securely connect and communicate around the world
sponsored by Verizon
WHITE PAPER: Access this white paper to discover an MPLS-based private IP service that provides highly scalable connectivity options, simple any-to-any network design, and can consolidate applications onto a single infrastructure.
Posted: 19 Feb 2015 | Published: 31 Dec 2013

Verizon

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Minimise the Security Risks of Mobile Email Access
sponsored by Hewlett-Packard Limited
EGUIDE: This expert e-guide will teach you how to put airtight security measures on remote e-mail access.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

ComputerWeekly.com

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com
1 - 25 of 154 Matches Previous Page    1 2 3 4    Next Page
 
VPN DEFINITION (continued): … A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps track of relating the virtual picture of the local area network with the actual physical picture.VLANs are considered likely to be used with campus environment networks. Among companies likely to provide products with VLAN support are Cisco, Bay Networks, and 3Com.There is a proposed VLAN standard, Institute of Electrical and Electronics Engineers 802.10.
VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement