IT Systems  >   Communications Networks  >  

VPN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps  … 
Definition continues below.
VPNReports
26 - 50 of 151 Matches Previous Page  | Next Page
New Virtual Networking Technologies Make Convergence Real
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

SearchSecurity.com

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

IT Security Case Studies
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Trends in Enterprise Mobility
sponsored by ComputerWeekly.com
WHITE PAPER: This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #2
sponsored by SearchSecurity.com
EGUIDE: Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Controlling Laptop and Smartphone Access to Corporate Networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information, but can serve as a vehicle for malware and other security threats. Find out how your IT department can enable secure access for mobile devices and laptops to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Network Rightsizing Blueprint for the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
Posted: 17 Jul 2013 | Published: 20 May 2013

Aruba Networks

The Great Multi Protocol Label Switching (MPLS) Migration
sponsored by SingTel
WHITE PAPER: This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

SingTel

The Business Platform Choice: Delivering IT - Business Integration with IPVPN
sponsored by SingTel
WHITE PAPER: This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

SingTel

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Network Evolution April 2013
sponsored by SearchNetworking.com
EZINE: This month's issue Network Evolution takes a hardcore look at the hybrid cloud horizon to explore the future possibility of networking across disparate clouds.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchNetworking.com

Five Challenges in Private Cloud Networking
sponsored by HP & Intel®
EGUIDE: This E-Guide from SearchNetworking.com unveils the top five challenges of private cloud networking and explores the ways to best overcome them. View now to learn more about address mapping, application acceleration, load balancing, and more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

HP & Intel®

Proper use of VPN and RPC/HTTPS
sponsored by F5 Networks
EGUIDE: Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

F5 Networks

Mitigating Risk in a Mobile World
sponsored by Symantec Corporation
WHITE PAPER: Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Symantec Corporation

The Art of Teleworking
sponsored by Polycom, Inc.
WHITE PAPER: This paper analyzes the teleworker's primary challenges and offers ideas for overcoming them. It highlights the advances of technology that make teleworking truly successful and of greater benefit to both teleworkers and their organizations.
Posted: 05 Sep 2012 | Published: 31 Oct 2011

Polycom, Inc.

Mobile Device Management Cloud Report
sponsored by Zenprise
WHITE PAPER: This quarterly report on mobile device management (MDM) cloud practices explores the latest trends surrounding the device enrollment, application usage, and security of mobile devices in the enterprise.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Zenprise

Next Generation Enterprise WAN Regional WAN Remote Access VPN overview
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Mobilize to Rightsize Your Network
sponsored by Aruba Networks
WHITE PAPER: Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!
Posted: 30 May 2012 | Published: 14 Mar 2011

Aruba Networks

A Business Guide to MPLS IP VPN Migration: Five Critical Factors
sponsored by XO Communications
WHITE PAPER: Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs.
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

Key Considerations for MPLS IP-VPN Success
sponsored by XO Communications
WHITE PAPER: Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

How to Accurately Detect and Correct Packet Loss
sponsored by Silver Peak
WHITE PAPER: This paper explains how packet loss can be properly measured throughout an enterprise, and what can be done to mitigate its effects in real-time.
Posted: 21 May 2012 | Published: 31 Dec 2010

Silver Peak
26 - 50 of 151 Matches Previous Page    1 2 3 4 5    Next Page
 
VPN DEFINITION (continued): … A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps track of relating the virtual picture of the local area network with the actual physical picture.VLANs are considered likely to be used with campus environment networks. Among companies likely to provide products with VLAN support are Cisco, Bay Networks, and 3Com.There is a proposed VLAN standard, Institute of Electrical and Electronics Engineers 802.10.
VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement