ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Research

  • Vodafone Cyber Enhanced | Specialist critical service protection

    Sponsored by: Vodafone

    While there are unknown and unanticipated threats present in every new technology decision, managed security solutions aim to offer specialist critical services protection to fit today’s threats. Take the survey to learn about 3 key solution benefits, threat detection capabilities and more in this video.

  • Our first 13 steps checklist to keeping your business cyber-secure

    Sponsored by: Vodafone

    Today’s workforce handling sensitive data remotely is essential to keep your business operational and profitable. But, according to a recent report, 10,000 cyberattacks are made against small businesses in the UK every day. This e-guide provides a checklist of the following 13 best practices. Take the survey to access the complete list.

  • Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • A Computer Weekly buyer's guide to video conferencing and collaboration

    Sponsored by: ComputerWeekly.com

    In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Security Strategies in the Age of Remote Work

    Sponsored by: Apcela

    In this webcast, join Mark Casey and Kunal Thakkar as they explore how different networking options like SASE, VPN, and SD-WAN make it easy for enterprises and their remote workers to protect their critical information without impacting their work.

  • Securing and Enabling Your Remote Workforce

    Sponsored by: Absolute Software Corporation

    Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Webinar - Summer school gone virtual? How to keep virtual activities safe for students

    Sponsored by: Cisco Umbrella

    Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.

  • Remote Work in the Age of Covid-19

    Sponsored by: AppNeta

    The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.

  • Voice over VPN vs. voice over cloud: a side-by-side comparison

    Sponsored by: Talkdesk

    Download this white paper to learn about the problems with relying on an on-prem VPN for voice communication and see why the cloud is the better choice for a WFH contact center.

  • Extending Secure Access to Remote Workers

    Sponsored by: Barracuda

    These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

  • New Options to Enable Remote Access in the Network

    Sponsored by: SearchNetworking.com

    This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • Avoid Multicloud Integration Costs

    Sponsored by: Rackspace

    Experts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs.

  • Agility in the Data Center

    Sponsored by: SearchNetworking.com

    This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.

  • Minimise the Security Risks of Mobile Email Access

    Sponsored by: Hewlett-Packard Enterprise

    This expert e-guide will teach you how to put airtight security measures on remote e-mail access.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

See more topics related to: VPN

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences