SSL VPN Research
-
E-Guide: Best Practices to ensure secure mobile communication
Sponsored by: TechTarget SecurityLearn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
-
SSL Certificate Management: A Practical Guide
Sponsored by: Symantec Website SecurityThis expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
-
How SSL and TLS Secure Network Transactions
Sponsored by: Symantec & Blue Coat SystemsThis expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: Symantec CorporationWeb security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: GeoTrust, Inc.This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: GeoTrust, Inc.This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: Thawte Inc.Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
-
How SSL and TLS Secure Network Transactions
Sponsored by: GeoTrust, Inc.This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!
-
Two-factor Authentication: A Tokenless Approach
Sponsored by: PortalGuardLearn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
-
Best practices for implementing 2048-bit SSL
Sponsored by: CitrixReady for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
-
The Evolving Threat Landscape
Sponsored by: Juniper Networks, Inc.This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.
-
E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
Sponsored by: Thawte Inc.This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
-
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
Sponsored by: VeriSign AustraliaThis paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
-
Making the Right Move to a Managed Service Provider for SSL VPN
Sponsored by: MegaPath Inc.Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
-
IT Decision Checklist: Remote Access
Sponsored by: VirtualArmorThe pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
-
Enabling Carrier-class Communications with EX Switches
Sponsored by: Juniper Networks, Inc.This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.
-
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
Sponsored by: Cisco Systems, Inc.This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
-
Deploying Firewalls throughout Your Organization
Sponsored by: Cisco Systems, Inc.Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
-
Cisco Secure Remote Access Solution
Sponsored by: Cisco Systems, Inc.This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
-
Unified Threat Management: The Best Defense against Blended Threats
Sponsored by: SonicWALLThe SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
-
Cisco ASA 5500 Series Business Edition Solution
Sponsored by: Cisco Systems, Inc.The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected.
-
Increase Productivity and Reduce Security Risks for Teleworkers
Sponsored by: SonicWALLThis paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
-
Keeping Your Data Safe and Your Networks Connected
Sponsored by: SonicWALLThis whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
-
DePaul University Case Study
Sponsored by: SonicWALLIn this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
-
Potomac Hospital Case Study
Sponsored by: SonicWALLIn this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.