In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.