IT Systems  >   Communications Networks  >  

VPN

RSS Feed   
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 

VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
VPN Reports
1 - 25 of 123 Matches Previous Page  |  Next Page
The Future of Network Visibility
sponsored by Cumulus
WEBCAST: Cloud services and products are putting new demands on networks and infrastructure to scale and support high-availability applications. IT and networking staff are under pressure to alleviate bottlenecks in cloud infrastructure, which can be done by optimizing the network itself. Download this white paper to learn more.
Posted: 15 Oct 2020 | Premiered: Oct 15, 2020

Cumulus

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

Stay Healthy, Stay Secure, Work Remote
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar as they explore how different networking options like SASE, VPN, and SD-WAN make it easy for enterprises and their remote workers to protect their critical information without impacting their work.
Posted: 09 Oct 2020 | Premiered: Jul 31, 2020

Apcela

COVID-19 & Beyond: Will the WFH Explosion Revolutionize Enterprise Security Architecture?
sponsored by Gigamon
ANALYST REPORT: New research shows why planning for a long-term remote workforce is critical and which approaches to turn to during COVID-19 and beyond. For those tasked with protecting network security, the work-from-home model creates unprecedented challenges. Read the paper to learn how to mitigate risks, gain control and secure the future.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Gigamon

Adopting a Remote-First Approach to Meet Employees and Customers Where They Are
sponsored by Comcast Business
WHITE PAPER: The impact of the COVID-19 pandemic has been widespread. For many businesses, the dispersed workforce caused by social distancing restrictions, has created the need to do things differently and reach customers in new ways. In this white paper, learn how your organization can help address a number of challenges caused by the COVID-19 pandemic.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Comcast Business

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

DTEX and the Insider Threat Kill Chain
sponsored by Dtex
EBOOK: With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

Dtex

Business Continuity: What Have We Learned So Far?
sponsored by Akamai Technologies
WEBCAST: Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.
Posted: 04 Aug 2020 | Premiered: Aug 4, 2020

Akamai Technologies

5 Ways to Keep Remote Workers Secure and Productive
sponsored by Absolute Software Corporation
WHITE PAPER: Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Absolute Software Corporation

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Guide to Software Defined Perimeter (SDP) Delivered as Part of a SASE Platform
sponsored by Cato Networks
DATA SHEET: As network bandwidths increase, there is a growing need for secure remote access options than can handle increased availability, performance, and security. View this data sheet to discover the potential of SDP as part of a SASE platform.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Cato Networks

Summer School Gone Virtual? How to Keep Virtual Activities Safe for Students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Remote Work in the Age of COVID-19
sponsored by AppNeta
WHITE PAPER: The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

AppNeta

Voice Over VPN vs. Voice Over Cloud: A Side-By-Side Comparison
sponsored by Talkdesk
WHITE PAPER: Download this white paper to learn about the problems with relying on an on-prem VPN for voice communication and see why the cloud is the better choice for a WFH contact center.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Talkdesk

Securing Remote Workers: Your Essential Guide
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

Securing Remote Workers: Your Essential Guide
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

How Software Defining the Home Office Can Ease Remote Working Challenges
sponsored by Infovista
RESOURCE: Since the work from home shift, telecommunications service providers warn that internet traffic has increased by over 40% due to the high consumption of content from Netflix and other streaming services. That means some services will inevitably be impacted and cause remote working challenges for your teams. So, what can you do? Read on to find out.
Posted: 04 May 2020 | Published: 04 May 2020

Infovista

The 10 Tenets of an Effective SASE Solution
sponsored by Palo Alto Networks
EBOOK: As networks become increasingly dispersed, organizations struggle to keep pace and ensure security, privacy, and integrity. Recently, organizations have begun incorporating secure access service edge (SASE) frameworks. This e-book goes in-depth into what SASE is, and 10 principles required to make them effective.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

Palo Alto Networks

Extending Secure Access to Remote Workers
sponsored by Barracuda
WEBCAST: These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
Posted: 07 Apr 2020 | Premiered: Apr 7, 2020

Barracuda

Work from Anywhere for Everyone
sponsored by Cato Networks
WHITE PAPER: The coronavirus outbreak has forced many organizations to move some or all of their employees to work from home. This unforeseen set of events caught many organizations off guard. In this white paper, learn how SASE can help organizations to support continuous remote access for all employees.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Cato Networks

Business Continuity
sponsored by PortSys
RESOURCE: Many organizations prior to COVID-19 had business continuity plans in place. But were counting on VPNs and VDIs, which happen to be among the most frequently targeted attack vectors by hackers. In this blog post from PortSys, get an in-depth overview of today’s security challenges with VPNs.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

PortSys

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

ComputerWeekly.com
1 - 25 of 123 Matches Previous Page    1 2 3 4    Next Page
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info