IT Systems  >   Communications Networks  >  

VPN

RSS Feed   
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 

VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
VPN Reports
1 - 25 of 115 Matches Previous Page  |  Next Page
Our first 13 steps checklist to keeping your business cyber-secure
sponsored by Vodafone
EGUIDE: Today’s workforce handling sensitive data remotely is essential to keep your business operational and profitable. But, according to a recent report, 10,000 cyberattacks are made against small businesses in the UK every day. This e-guide provides a checklist of the following 13 best practices. Take the survey to access the complete list.
Posted: 28 Sep 2021 | Published: 28 Sep 2021

TOPICS:  VPN
Vodafone

Vodafone Cyber Enhanced | Specialist critical service protection
sponsored by Vodafone
VIDEO: While there are unknown and unanticipated threats present in every new technology decision, managed security solutions aim to offer specialist critical services protection to fit today’s threats. Take the survey to learn about 3 key solution benefits, threat detection capabilities and more in this video.
Posted: 28 Sep 2021 | Premiered: 28 Sep 2021

TOPICS:  VPN
Vodafone

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Axis Case Study: Cardenas Markets Case Study / 1 Prabash Coswatte, Former Ciso (Cardenas) How Axis Keeps A Grocery Chain Well-Stocked And Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: How will the lessons learned over the past year shape your endpoint and remote worker security goals for 2021? Let us know in this short survey and receive FREE access to our e-guide, The Ultimate Guide to Securing Today's Remote Workforce.
Posted: 28 Oct 2020 | Published: 01 Mar 2021

TechTarget

Stay Healthy, Stay Secure, Work Remote
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar as they explore how different networking options like SASE, VPN, and SD-WAN make it easy for enterprises and their remote workers to protect their critical information without impacting their work.
Posted: 09 Oct 2020 | Premiered: Jul 31, 2020

Apcela

Securing and Enabling Your Remote Workforce
sponsored by Absolute Software Corporation
WHITE PAPER: Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Absolute Software Corporation

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Webinar - Summer school gone virtual? How to keep virtual activities safe for students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Remote Work in the Age of Covid-19
sponsored by AppNeta
WHITE PAPER: The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

AppNeta

Voice over VPN vs. voice over cloud: a side-by-side comparison
sponsored by Talkdesk
WHITE PAPER: Download this white paper to learn about the problems with relying on an on-prem VPN for voice communication and see why the cloud is the better choice for a WFH contact center.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Talkdesk

Remote Work Headaches: Security Risks to Mitigate Today
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

Remote Work Headaches: Security Risks to Mitigate Today
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

Extending Secure Access to Remote Workers
sponsored by Barracuda
WEBCAST: These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
Posted: 07 Apr 2020 | Premiered: Apr 7, 2020

Barracuda

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

Computer Weekly - 6 July 2021: Where to start with Windows 11
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.
Posted: 05 Jul 2021 | Published: 06 Jul 2021

ComputerWeekly.com

New Options to Enable Remote Access in the Network
sponsored by SearchNetworking.com
EBOOK: This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
Posted: 04 Oct 2017 | Published: 30 Sep 2017

SearchNetworking.com

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE: Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.
1 - 25 of 115 Matches Previous Page    1 2 3 4    Next Page
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences