ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Research

  • 2019 Cybersecurity Trends

    Sponsored by: Cisco Umbrella

    In this research summary of 2019’s cybersecurity trends, discover the challenges, best practices, market trends & prominent threats as they relate to today’s increasingly distributed enterprises. Continue to this report to learn more.

  • CyberArk Alero

    Sponsored by: Cyber-Ark Software

    As businesses continue to rely on remote vendors to manage portions of their IT infrastructure, providing privileged access to off-site staff becomes increasingly critical & traditional services aren’t designed to meet this challenge. Read on to learn more about a service designed to provide secure infrastructure access to remote devices.

  • A Buying Guide for Next-Gen Remote Access

    Sponsored by: Citrix

    In this e-book, discover Citrix Gateway, a next-generation SSL VPN, and the ways it helps enterprise IT better address remote access challenges.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • The Definitive Guide to Secure Remote Access

    Sponsored by: Zscaler

    Explore the leading known challenges with traditional VPNs when it comes to securing cloud apps and networks, and discover 4 tenets of digital, cloud-ready remote-access security.

  • SDN is Dead! Long live SDN!

    Sponsored by: Cumulus

    Find out how EVPN changed the game with a controller-less SDN and learn about a platform that's designed to help you deploy SDN for the first time or even complement existing controller-based SDN architectures.

  • IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Sponsored by: ComputerWeekly.com

    Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.

  • WAN Speak Musings – Volume III

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.

  • New Virtual Networking Technologies Make Convergence Real

    Sponsored by: SearchSecurity.com

    This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.

  • New Options to Enable Remote Access in the Network

    Sponsored by: SearchNetworking.com

    This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • Avoid Multicloud Integration Costs

    Sponsored by: Rackspace

    Experts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs.

  • Agility in the Data Center

    Sponsored by: SearchNetworking.com

    This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.

  • Minimise the Security Risks of Mobile Email Access

    Sponsored by: Hewlett-Packard Enterprise

    This expert e-guide will teach you how to put airtight security measures on remote e-mail access.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Computer Weekly – 22 April 2014: Adapting to life after Heartbleed

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

  • Computer Weekly – 15 April 2014: Spies in the VPN

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.

  • Network Evolution – March 2014

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • File Sync and Share: Risks, Rewards, Considerations, and Deployment Options

    Sponsored by: Dropbox for Business

    This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

See more topics related to: VPN

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.