IT Systems  >   Communications Networks  >  

VPN

RSS Feed   
ALSO CALLED: Private Networks, Virtual Private Networking, V P N, Virtual Private Networks, VPNs
DEFINITION: A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device. The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise in much the same way that hardware routers offer additional security (when compared to firewall programs)  … 

VPN definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
VPN Reports
1 - 25 of 108 Matches Previous Page  |  Next Page
Third Party Privileged Access to Critical Systems
sponsored by Cyber-Ark Software
EBOOK: Third-party vendors play a pivotal role in the way business is conducted today. Yet, organizations tend to use antiquated methods, like VPNs, to allow access. In this e-book, explore the results of a recent CyberArk study into third-party privileged access and learn the steps your organization can take to ensure secure vendor access.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cyber-Ark Software

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

What is Tehama?
sponsored by Tehama
VIDEO: Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.
Posted: 20 Jan 2020 | Premiered: 20 Jan 2020

Tehama

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

CyberArk Alero
sponsored by Cyber-Ark Software
WHITE PAPER: As businesses continue to rely on remote vendors to manage portions of their IT infrastructure, providing privileged access to off-site staff becomes increasingly critical & traditional services aren’t designed to meet this challenge. Read on to learn more about a service designed to provide secure infrastructure access to remote devices.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Cyber-Ark Software

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

SDN is Dead! Long live SDN!
sponsored by Cumulus
WHITE PAPER: Find out how EVPN changed the game with a controller-less SDN and learn about a platform that's designed to help you deploy SDN for the first time or even complement existing controller-based SDN architectures.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Cumulus

IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

ComputerWeekly.com

New Options to Enable Remote Access in the Network
sponsored by SearchNetworking.com
EBOOK: This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
Posted: 04 Oct 2017 | Published: 30 Sep 2017

SearchNetworking.com

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE: Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.

Avoid Multicloud Integration Costs
sponsored by Rackspace
EGUIDE: Experts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

Rackspace

Agility in the Data Center
sponsored by SearchNetworking.com
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchNetworking.com

Minimise the Security Risks of Mobile Email Access
sponsored by Hewlett-Packard Enterprise
EGUIDE: This expert e-guide will teach you how to put airtight security measures on remote e-mail access.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Enterprise

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Robert Walters - Global IP VPN
sponsored by Telstra Global
CASE STUDY: This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Telstra Global

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Computer Weekly – 15 April 2014: Spies in the VPN
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
Posted: 14 Apr 2014 | Published: 15 Apr 2014

ComputerWeekly.com

Network Evolution – March 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

SearchNetworking.com

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software
1 - 25 of 108 Matches Previous Page    1 2 3 4    Next Page
Browse by Report Type:
VPN White Papers | VPN Multimedia | VPN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info