IT Systems  >   Communications Networks  >  

VPN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 
Definition continues below.
VPN Reports
1 - 25 of 147 Matches Previous Page  |  Next Page
Avoid Multicloud Integration Costs
sponsored by Rackspace
EGUIDE: Experts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

Rackspace

3 Remote Desktop Factors That Contribute to System Administration Chaos
sponsored by Devolutions
WHITE PAPER: For sysadmins, securely managing credentials and configuring connections for each user situation can be a complex task. Download this white paper to discover a system that can help centralize configuration and connection information, and manage user credentials without exposing passwords - all through a single pane of glass.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Devolutions

4 Keys to More Effective CIO Succession Planning
sponsored by Infor
WHITE PAPER: Many companies face two dilemmas with respect to technology strategy—succession planning for retiring CIOs, and keeping up with the digital transformation of their industry. This white paper highlights the 4 keys to more effective CIO succession planning in the age of digital transformation.
Posted: 17 Oct 2016 | Published: 03 Oct 2016

Infor

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Do You Need a VPN, Firewall or Both?
sponsored by Global Knowledge
WHITE PAPER: In this Global Knowledge white paper, discover when VPNs and firewalls are most effective, suggestions for deployment, when a unified threat management system is worth considering, and hardware vs. software concerns.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

Global Knowledge

IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

ComputerWeekly.com

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Array Purpose-Built SSL VPN Overview
sponsored by Array Networks
WHITE PAPER: Learn about the issues with SSL VPN firewall integration and how to overcome them in this white paper.
Posted: 31 May 2017 | Published: 28 Feb 2017

Array Networks

IT: Meet Your Agile, Hybrid Cloud Initiative
sponsored by AT&T
WEBCAST: Listen to this on-demand webinar to get expert insights from IDC analyst Courtney Munroe and Amy Machi from AT&T. They'll be discussing how you can build a hybrid cloud that provides the agility, flexibility, and low costs you want, alongside the security and control that you need.
Posted: 06 Jul 2016 | Premiered: Jun 9, 2016

AT&T

New Cloud Networking Provides the Best of Both Worlds
sponsored by AT&T
PRODUCT OVERVIEW: Cloud networking can provide the best of both worlds: performance and security of your MPLS virtual private network coupled with the speed and capabilities. This white paper details how new cloud networking can provide benefits that simplify management, enable bandwidth flexing, and more.
Posted: 01 Jul 2016 | Published: 30 Jun 2016

AT&T

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Extending Your VPN Is the Key to Cloud Success in Government and Education
sponsored by AT&T
WHITE PAPER: Learn about your ability to simplify management, add security, and ensure that critical areas, like compliance and data management, remain uncompromised.
Posted: 11 May 2016 | Published: 04 May 2016

AT&T

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

Agility in the Data Center
sponsored by SearchSDN.com
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchSDN.com

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Minimise the Security Risks of Mobile Email Access
sponsored by Hewlett-Packard Enterprise
EGUIDE: This expert e-guide will teach you how to put airtight security measures on remote e-mail access.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Enterprise

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

ComputerWeekly.com

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software
1 - 25 of 147 Matches Previous Page    1 2 3 4    Next Page
 
VPN DEFINITION (continued): …  for home and small-business computer users. A traditional VPN is, essentially, a set of programs on the same platform as the network operating system. Such a VPN provides remote offices or individual users with secure access to their organization's network by using the shared public telecommunications infrastructure and standard security measures. Hardware VPNs offer a number of advantages over the software-based VPN. In addition to enhanced security, hardware VPNs provide load balancing and the ability to handle large client loads. Administration is managed through a Web browser interface. A … 
VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement