Hardware  >   Networking Hardware  >  

Security Gateways

RSS Feed   
Security Gateways Reports
 
Putting Tech to the Test: Why VPNs Struggle in the Cloud-Native Era
sponsored by NetFoundry
RESOURCE: Learn about an approach to network security that is better suited for the cloud-native era in this blog post.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

NetFoundry

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com

Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

ComputerWeekly.com

How to Cut Overhead Costs Right Now: Connect Remote Workers, Using VPN Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Giving remote workers easy and secure access to your network with virtual private network (VPN) technology can result in big savings.
Posted: 14 Aug 2009 | Published: 14 Aug 2009

Cisco Systems, Inc.

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

The Business Platform Choice: Delivering IT - Business Integration with IPVPN
sponsored by SingTel
WHITE PAPER: This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

SingTel

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

How the University of Arkansas Created an Award Winning VDI Deployment
sponsored by Dell
CASE STUDY: Download this case study to uncover the unique combination of technologies that allowed the IT department at the University of Arkansas to deploy virtual desktops for a variety of needs, scale in response to user demands and evolve to meet the requirements of different colleges and departments.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Dell

How You Can Make Incident Response Faster and More Efficient
sponsored by Corelight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

Corelight
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement