IT Systems  >   Communications Networks  >   VPN  >  

Internet Protocol Security Virtual Private Networks

RSS Feed   
Internet Protocol Security Virtual Private Networks Reports
 
7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Thinking Of Cloud Communications? Here’s How To Match The Right Solution To Your Needs
sponsored by Avaya
RESOURCE: As we move to a new world of work that freely flows between the office and everywhere else, finding the right UCaaS solution for your organization will be vital. In this blog post, learn 5 tips to help keep the selection process simple and find your best match to maximize the full potential of UCaaS.
Posted: 07 Apr 2021 | Published: 11 Mar 2021

Avaya

Seven Critical Success Factors For Your Cloud Voice Strategy
sponsored by Intrado
WHITE PAPER: With time, a move to cloud voice is becoming more and more essential. Even before the world went remote, analysts were predicting an explosive growth in cloud communications. Now, you must ready your employees for the future of work. Take in this white paper outlining 7 critical success factors to implementing cloud voice.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Intrado

Gist Voicemail Transcriptions Delivered, As Text To Your Email
sponsored by Momentum Systems
DATA SHEET: Gist by Momentum Telecom delivers voicemail transcriptions as text to your email. This allows users to see all the information they need at a glance while also promoting uninterrupted communication flow. Download this brief to learn more.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Momentum Systems

What Enterprises Need To Know Aboute911 and Ucaas
sponsored by Intrado
ANALYST REPORT: Most UCaaS providers only support per-phone manual location configuration, making it impractical for customers to configure Enhanced 911 location information as deployments scale. In this report, learn why organizations need an automated solution that leverages Next Generation 911 standards to enable endpoints to determine their own location.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

Intrado
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences