IT Systems  >   Communications Networks  >   VPN  >  

IP Security VPN

RSS Feed   
IP Security VPN Reports
 
IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Succeed in the Digital Era With Cloud Communications
sponsored by Zoom Video Communications
EBOOK: As businesses develop their infrastructure, it’s important that their communications architecture can match the scale of their growth. This is why unified communications in the cloud, or UCaaS, is ramping up in popularity – improved UX and manageability are among the many benefits of UCaaS. Go into this Frost & Sullivan e-book to learn more.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Zoom Video Communications

Solution Guide to the Video Enabled Meeting Room Experience
sponsored by AudioCodes
WHITE PAPER: The world of work is defined by the emerging requirements of a video-enabled meeting room experience, as well as the familiar foundation of unified communications and collaboration in the enterprise. But, how well you collaborate starts with the quality of the hardware you select. Read this white paper to learn more.
Posted: 15 Oct 2020 | Published: 31 May 2020

AudioCodes

Electrolux Delivers the World’s Best Appliances with Premium Collaboration from BlueJeans
sponsored by Blue Jeans Network
CASE STUDY: Electrolux, a Swedish appliance manufacturing company with over 55,000 employees, required video-first communications to replace their hard-to-use legacy conferencing technology. In the end, they achieved greater bandwidth and a higher rate of satisfaction among end users. Read the full case study and to learn how they did it.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Blue Jeans Network

Automated Assurance is Key to the Automation of 5G and SD-WAN Operations
sponsored by Spirent
WHITE PAPER: 5G and SD-WAN are significant emerging technologies hitting the market. However, as operations automation becomes more pervasive, these technologies will need to be rigorously checked for vulnerabilities. Luckily, automation can help. Read this white paper to understand automated assurance.
Posted: 15 Oct 2020 | Published: 31 Mar 2019

Spirent
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info