IT Systems  >   Communications Networks  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 
Definition continues below.
VPN Reports
1 - 25 of 153 Matches Previous Page  |  Next Page
4 Keys to More Effective CIO Succession Planning
sponsored by Infor
WHITE PAPER: Many companies face two dilemmas with respect to technology strategy—succession planning for retiring CIOs, and keeping up with the digital transformation of their industry. This white paper highlights the 4 keys to more effective CIO succession planning in the age of digital transformation.
Posted: 17 Oct 2016 | Published: 03 Oct 2016


Quantifying Business Benefits of NFV-Based Managed Enterprise Services
sponsored by Ciena
WHITE PAPER: Service providers are transforming their services and networks by using SDN and NFV. This white paper explains the benefits of the NFV-based managed enterprise services necessary to know for a successful transformation. Access now to learn about these benefits and a consulting service that can help build the business of a SDN and NFV network.
Posted: 31 Aug 2016 | Published: 30 Jun 2016


Case Study: Hassle-Free Cloud Migration
sponsored by BT
CASE STUDY: The move to the cloud can be a costly endeavor without a solid plan and the right management tools. This case study examines how one online service's company was able to successfully migrate to the cloud by employing a cloud management platform. Access now to learn about this platform's multitude of core services and the benefits it offers.
Posted: 23 Aug 2016 | Published: 31 Mar 2016


AAA WCNY Optimizes Roadside Assistance, Delivers Physical and Network Security
sponsored by Splunk
CASE STUDY: Discover how to achieve full operational visibility into your network security and firewall traffic. Learn how AAA Western and Central New York leveraged cloud to monitor their VPN, enhance PCI compliance, and deliver superior customer service—all not possible without its secure network.
Posted: 17 May 2016 | Published: 17 May 2016


The State of Software-Defined WAN
sponsored by Silver Peak
WHITE PAPER: This resource explores key trends in software-defined networks and offers in-depth advice on how to address the limitations of today's VPN. Read on to see how software-defined WANs could help your company maximize its investments with the cloud.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Silver Peak

Speed, Security, Availability: Apps Delivered Wherever You Are
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn how to protect your cloud applications with an app-centric strategy that provides certainty that app delivery will be seamless no matter where you are, security that meets requirements across hybrid environments, allows for deeper visibility, and mitigates risk with consistent policies, and more.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

F5 Networks

IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Efficient Cloud Connectivity Ensures Optimal Cloud Computing
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains the attraction to the cloud, and why many enterprises are now migrating their internal data center infrastructure and business applications to public and private clouds.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

IT: Meet Your Agile, Hybrid Cloud Initiative
sponsored by AT&T
WEBCAST: Listen to this on-demand webinar to get expert insights from IDC analyst Courtney Munroe and Amy Machi from AT&T. They'll be discussing how you can build a hybrid cloud that provides the agility, flexibility, and low costs you want, alongside the security and control that you need.
Posted: 06 Jul 2016 | Premiered: Jun 9, 2016


New Cloud Networking Provides the Best of Both Worlds
sponsored by AT&T
PRODUCT OVERVIEW: Cloud networking can provide the best of both worlds: performance and security of your MPLS virtual private network coupled with the speed and capabilities. This white paper details how new cloud networking can provide benefits that simplify management, enable bandwidth flexing, and more.
Posted: 01 Jul 2016 | Published: 30 Jun 2016


Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016


Extending Your VPN Is the Key to Cloud Success in Government and Education
sponsored by AT&T
WHITE PAPER: Learn about your ability to simplify management, add security, and ensure that critical areas, like compliance and data management, remain uncompromised.
Posted: 11 May 2016 | Published: 04 May 2016


For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016


Consolidating Security to Increase Performance and Lower Costs
sponsored by Fortinet, Inc.
CASE STUDY: This case study describes the solution that enabled a healthcare organization to compress, accelerate, and encrypt connections to low bandwidth remote locations without the need for additional devices.
Posted: 16 Feb 2016 | Published: 21 May 2015

Fortinet, Inc.

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013


Agility in the Data Center
sponsored by
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Minimise the Security Risks of Mobile Email Access
sponsored by Hewlett-Packard Enterprise
EGUIDE: This expert e-guide will teach you how to put airtight security measures on remote e-mail access.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Enterprise

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Network Evolution – March 2014
sponsored by
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software
1 - 25 of 153 Matches Previous Page    1 2 3 4    Next Page
VPN DEFINITION (continued): …  for home and small-business computer users. A traditional VPN is, essentially, a set of programs on the same platform as the network operating system. Such a VPN provides remote offices or individual users with secure access to their organization's network by using the shared public telecommunications infrastructure and standard security measures. Hardware VPNs offer a number of advantages over the software-based VPN. In addition to enhanced security, hardware VPNs provide load balancing and the ability to handle large client loads. Administration is managed through a Web browser interface. A … 
VPN definition sponsored by, powered by an online computer dictionary
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement