IT Systems  >   Communications Networks  >  

VPN

RSS Feed   
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 

VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
VPN Reports
1 - 25 of 115 Matches Previous Page  |  Next Page
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

A Comprehensive Guide On How To Secure Your Remote Workforce: The Critical Role Of A Secure VPN
sponsored by Palo Alto Networks
WHITE PAPER: Secure remote work is hot topic even now, and as such, VPNs still have the full attention of security teams and professionals. While many organizations use VPN, some are not aware of the full scale of benefits it can provide. Leverage this white paper to learn why secure VPN is essential to remote workforce security.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Palo Alto Networks

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: How will the lessons learned over the past year shape your endpoint and remote worker security goals for 2021? Let us know in this short survey and receive FREE access to our e-guide, The Ultimate Guide to Securing Today's Remote Workforce.
Posted: 28 Oct 2020 | Published: 01 Mar 2021

TechTarget

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

Stay Healthy, Stay Secure, Work Remote
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar as they explore how different networking options like SASE, VPN, and SD-WAN make it easy for enterprises and their remote workers to protect their critical information without impacting their work.
Posted: 09 Oct 2020 | Premiered: Jul 31, 2020

Apcela

COVID-19 & Beyond: Will the WFH Explosion Revolutionize Enterprise Security Architecture?
sponsored by Gigamon
ANALYST REPORT: New research shows why planning for a long-term remote workforce is critical and which approaches to turn to during COVID-19 and beyond. For those tasked with protecting network security, the work-from-home model creates unprecedented challenges. Read the paper to learn how to mitigate risks, gain control and secure the future.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Gigamon

Securing and Enabling Your Remote Workforce
sponsored by Absolute Software Corporation
WHITE PAPER: Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Absolute Software Corporation

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Webinar - Summer school gone virtual? How to keep virtual activities safe for students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Voice over VPN vs. voice over cloud: a side-by-side comparison
sponsored by Talkdesk
WHITE PAPER: Download this white paper to learn about the problems with relying on an on-prem VPN for voice communication and see why the cloud is the better choice for a WFH contact center.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Talkdesk

Remote Work Headaches: Security Risks to Mitigate Today
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

Remote Work Headaches: Security Risks to Mitigate Today
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

Extending Secure Access to Remote Workers
sponsored by Barracuda
WEBCAST: These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
Posted: 07 Apr 2020 | Premiered: Apr 7, 2020

Barracuda

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

Computer Weekly - 6 July 2021: Where to start with Windows 11
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.
Posted: 05 Jul 2021 | Published: 06 Jul 2021

ComputerWeekly.com

New Options to Enable Remote Access in the Network
sponsored by SearchNetworking.com
EBOOK: This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
Posted: 04 Oct 2017 | Published: 30 Sep 2017

SearchNetworking.com

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE: Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.
1 - 25 of 115 Matches Previous Page    1 2 3 4    Next Page
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences