ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Software Research

  • Remote Work-From-Home Cybersecurity Report

    Sponsored by: Pulse Secure

    This is a survey that was conducted by Cybersecurity Insiders of 400 IT security decision-makers from companies of varying sizes across multiple industries. It offers insight into the minds of professionals who have had to both rebound from the sudden shift to WFH and prepare potential long-term secure access strategies.

  • Remote Work in the Age of COVID-19

    Sponsored by: AppNeta

    The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.

  • How to Improve Your Enterprise VPN Security

    Sponsored by: Vulcan

    The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Sponsored by: ComputerWeekly.com

    Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Computer Weekly – 15 April 2014: Spies in the VPN

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.

  • Network Evolution – March 2014

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • The Business Platform Choice: Delivering IT - Business Integration with IPVPN

    Sponsored by: SingTel

    This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.

  • Next Generation Enterprise WAN Regional WAN Remote Access VPN overview

    Sponsored by: Cisco Systems, Inc.

    Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.

  • Next Generation Enterprise WAN DMVPN

    Sponsored by: Cisco Systems, Inc.

    Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • The Virtual Office Checklist

    Sponsored by: Cisco Systems, Inc.

    The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.

  • DePaul University Case Study

    Sponsored by: SonicWALL

    In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.

  • IPSEC VS. VPN: Transition Criteria and Methodology

    Sponsored by: SonicWALL

    This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.

  • 7 Key Requirements for Remote Access

    Sponsored by: Citrix

    Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.

Browse by Report Type: VPN Software White Papers | VPN Software Multimedia | VPN Software IT Downloads

See more topics related to: VPN Software

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.