VPN Research
-
A Computer Weekly buyer's guide to video conferencing and collaboration
Sponsored by: TechTarget ComputerWeekly.comIn this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Extending Secure Access to Remote Workers
Sponsored by: BarracudaThese are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: TechTarget ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Computer Weekly - 6 July 2021: Where to start with Windows 11
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: TechTarget ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
Top VPNs secretly owned by Chinese firms
Sponsored by: TechTarget ComputerWeekly.comNearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
-
A Computer Weekly buyer’s guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
New Options to Enable Remote Access in the Network
Sponsored by: TechTarget NetworkingThis handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
-
Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
Sponsored by: Cisco UmbrellaCisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
-
Cisco ASA 5500 Series Adaptive Security Appliances
Sponsored by: Cisco Systems, Inc.Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
-
Avoid Multicloud Integration Costs
Sponsored by: Rackspace TechnologyExperts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs.
-
Agility in the Data Center
Sponsored by: TechTarget NetworkingThis expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
-
Minimise the Security Risks of Mobile Email Access
Sponsored by: Hewlett-Packard EnterpriseThis expert e-guide will teach you how to put airtight security measures on remote e-mail access.
-
Network Protection and UTM Buyer's Guide
Sponsored by: SophosThis white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
-
Robert Walters - Global IP VPN
Sponsored by: Telstra GlobalThis exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.
-
Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
-
Computer Weekly – 15 April 2014: Spies in the VPN
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
-
Network Evolution – March 2014
Sponsored by: TechTarget NetworkingIn this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.
-
Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
Sponsored by: Dell SoftwareDiscover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
-
As data grows, so do the risks: How to improve data and app sec
Sponsored by: IBMAccess this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
File Sync and Share: Risks, Rewards, Considerations, and Deployment Options
Sponsored by: Dropbox for BusinessThis e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.