IT Systems  >   Communications Networks  >   VPN  >  

IP Security Protocol VPN

RSS Feed   
IP Security Protocol VPN Reports
 
DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Adapt Your Business to the New Normal
sponsored by Kingpin Comm. - 8X8
RESOURCE: The Covid-19 outbreak has forced many businesses to close their doors and to rely on remote working. However, some businesses still rely on traditional communication tools, which can restrict remote working. In this interactive resource, learn how 8x8 Open Communication Platform can help your organization maintain business continuity.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Kingpin Comm. - 8X8

Solution Guide to the Video Enabled Meeting Room Experience
sponsored by AudioCodes
WHITE PAPER: The world of work is defined by the emerging requirements of a video-enabled meeting room experience, as well as the familiar foundation of unified communications and collaboration in the enterprise. But, how well you collaborate starts with the quality of the hardware you select. Read this white paper to learn more.
Posted: 15 Oct 2020 | Published: 31 May 2020

AudioCodes

Booking.com’s Adaptive Workforce Brings Bluejeans to the Home Office
sponsored by Blue Jeans Network
CASE STUDY: For Booking.com, the pandemic forced an overnight move to remote work for over 26,000 employees across 198 offices and 70 countries. As a result, they were looking for UC & collaboration software that could deliver seamless meeting experiences as well as integrations for content sharing. Read this short case study to learn where they found it.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Blue Jeans Network

Remote Worker Security 101: VPNs, Endpoint Security Platforms & more
sponsored by TechTarget
RESOURCE: Securing remote workforces amid the pandemic has been a major hurdle – introducing new operational & security challenges while magnifying existing risks. In our new e-guide, The Ultimate Guide to Securing Today's Remote Workforce, we address some of these risks & challenges. Complete our brief endpoint security survey to receive your free
Posted: 28 Oct 2020 | Published: 28 Oct 2020

TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info