IT Systems  >   Communications Networks  >   VPN  >  

Internet Protocol Security VPN

RSS Feed   
Internet Protocol Security VPN Reports
 
7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Accelerator for O365
sponsored by Riverbed
DATA SHEET: Network inhibitors such as latency, congestion and the unpredictability of dynamic workforces can greatly impact the user experience of Microsoft O365, effectively lowering the ROI enterprises can expect from major investments in this valuable collaboration suite. Read this data sheet to learn how you may be able to find relief.
Posted: 16 Oct 2020 | Published: 31 Jul 2020

Riverbed

Removing Complexity: Managing a Microsoft Intelligent Communications Solution
sponsored by AudioCodes
WHITE PAPER: Microsoft Intelligent Communications has collaboration, but managing these platforms for a dynamic workforce can be challenging. Now, user lifecycles, devices and call quality can all be seen at a granular level – and with a remote workforce, this is invaluable. Scan this white paper to learn how AudioCodes may help to simplify UC.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

AudioCodes

Connect Everywhere: Better Voice Communications for Microsoft Teams
sponsored by Kingpin Comm. - 8X8
EBOOK: Microsoft Teams has provided unprecedented communications capabilities for its over 75 million daily users, but organizations can still do more to support voice services for Teams. While business phone has not seen as much use, its critical role in communications cannot be ignored. Read this e-book to learn about Teams and voice integration.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Kingpin Comm. - 8X8

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info