IT Systems  >   Communications Networks  >  

VPN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps  … 
Definition continues below.
VPNReports
1 - 25 of 151 Matches Previous Page  | Next Page
Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Six Reasons VDI + Data Protection Can Strengthen Your Security Posture
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover six reasons VDI and data protection can strengthen your security posture as a whole.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Deliver Simple and Secure Access to Behind-the-Firewall Business Resources
sponsored by IBM
WHITE PAPER: Learn the ins-and-outs of a solution capable of delivering simple and secure access to behind-the-firewall business resources such as Windows File Share content and intranet sites without requiring changes to your network, firewall security configuration or device VPN.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

European Mobile Phone Retailer, the Carphone Warehouse, Secures Employee Remote Access with HID Global’s Authentication Solutions
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secures employee remote access. Read on to find out why this retailer chose HID Global over other vendors due to the strong authentication characteristics behind it.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

Best practices for securing mobile email access
sponsored by Hewlett-Packard Limited and Intel ®
EGUIDE: As companies continue to encourage and enable their employees to work remotely, accessing email and information on Exchange servers in a secure environment is not always easy. A secure connection is necessary in order to guarantee there will be no consequences for a potential threat or attack.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited and Intel ®

Mobilize your Corporate Content and Apps
sponsored by IBM
WHITE PAPER: This white paper explores how organizations can embrace, plan, and deploy a comprehensive mobile strategy that harnesses the power of mobility with secure access to business resources.
Posted: 22 Jul 2014 | Published: 29 Jul 2011

IBM

Carrier Ethernet: Transforming Business Telecommunications
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper elucidates the process of selecting the best services for your organization's WAN needs, including Private Line, Layer 2 VPNs, and Layer 3 VPNs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

Cox Metro Ethernet Services
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper introduces two network solutions, ELAN and MPLS IP-VPN, and helps you to discover which is better suited for your enterprise's networking needs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

AlienVault and the MSSP Program Overview
sponsored by AlienVault
WEBCAST: Watch this webcast to get an inside scoop on all that MSSP has to offer.
Posted: 17 Jun 2014 | Premiered: Jun 17, 2014

AlienVault

Preparing your Organisation to Defend Against Cyber Crime
sponsored by TechTarget
RESOURCE: With networks growing larger and evermore complex, what information security professionals need most to secure their systems are a sharp eye and a clear plan. Is your organisation's security strategy aligned to best defend against hackers? Take this brief survey and gain access to our eguide, Countering Cybercrime With a Sharp Eye and a Clear Plan.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Evolving Security Tech Presents New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software

Single Point of Access, Single Point of Control
sponsored by Citrix
WHITE PAPER: Read on to learn how desktop virtualization can help support remote connectivity better than VPN.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

Citrix

WAN Speak Musings – Volume III
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

File Sync and Share: Risks, Rewards, Considerations, and Deployment Options
sponsored by Dropbox for Business
EGUIDE: This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Dropbox for Business
1 - 25 of 151 Matches Previous Page    1 2 3 4    Next Page
 
VPN DEFINITION (continued): … A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps track of relating the virtual picture of the local area network with the actual physical picture.VLANs are considered likely to be used with campus environment networks. Among companies likely to provide products with VLAN support are Cisco, Bay Networks, and 3Com.There is a proposed VLAN standard, Institute of Electrical and Electronics Engineers 802.10.
VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement