IT Systems  >   Communications Networks  >   VPN  >  

IP Security VPN

RSS Feed   
IP Security VPN Reports
 
E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

5 Myths About UCaaS
sponsored by Ooma
WHITE PAPER: People all over the world have misconceptions about unified communications, especially UCaaS. This can make it hard to make business decisions. In this white paper, 5 popular myths about UCaaS are debunked.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Ooma

Case Study: Optimizing Aging IT Processes with Automation and Machine Learning
sponsored by Ayehu
CASE STUDY: See firsthand how a multi-national company counteracted aging and ineffective IT practices through automation, analytics-driven support tools, and even machine learning – all to earn their competitive edge back.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ayehu

National Pizza Chains Custom-Fit UCaaS & Call Center Capabilities to Drive Efficiencies and Revenues
sponsored by Ooma
CASE STUDY: National pizza chains build their business on volume. It’s a straightforward business model, yet there are inefficiencies in their order processing workflows. In this case study, learn how Ooma’s call quality and customization capabilities enabled a pizza chain to design and deploy a call workflow that was tailored to fit its business needs.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ooma

The Savings and Benefits of Ansible Tower
sponsored by Red Hat
WHITE PAPER: In this executive overview, get a closer look at the savings and operational benefits one organization realized through three-years of using Red Hat Ansible Tower, including a 146% ROI, a 67% reduction in man hour requirements to deliver on customer agreements, and more.
Posted: 02 Dec 2019 | Published: 29 Jun 2018

TOPICS:  IT Systems
Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement