ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Research

  • New Virtual Networking Technologies Make Convergence Real

    Sponsored by: TechTarget Security

    This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.

  • Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  • Wireless LAN ITDC - Checklist #3

    Sponsored by: TechTarget Security

    This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.

  • Wireless LAN ITDC - Checklist #2

    Sponsored by: TechTarget Security

    Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.

  • E-Guide: Best Practices to ensure secure mobile communication

    Sponsored by: TechTarget Security

    Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.

  • Securing Corporate Data in the Age of Mobile Computing

    Sponsored by: TechTarget Security

    This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.

  • BYOD: Bring Your Own Device – or Bring Your Own Danger?

    Sponsored by: WatchGuard Technologies, Inc.

    This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • The Great Multi Protocol Label Switching (MPLS) Migration

    Sponsored by: Singtel

    This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.

  • The Business Platform Choice: Delivering IT - Business Integration with IPVPN

    Sponsored by: Singtel

    This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.

  • Application Optimization for the Network

    Sponsored by: TechTarget Networking

    In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.

  • Network Evolution April 2013

    Sponsored by: TechTarget Networking

    This month's issue Network Evolution takes a hardcore look at the hybrid cloud horizon to explore the future possibility of networking across disparate clouds.

  • Five Challenges in Private Cloud Networking

    Sponsored by: HP & Intel®

    This E-Guide from SearchNetworking.com unveils the top five challenges of private cloud networking and explores the ways to best overcome them. View now to learn more about address mapping, application acceleration, load balancing, and more!

  • Next Generation Enterprise WAN Regional WAN Remote Access VPN overview

    Sponsored by: Cisco Systems, Inc.

    Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.

  • Next Generation Enterprise WAN DMVPN

    Sponsored by: Cisco Systems, Inc.

    Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.

  • Mobilize to Rightsize Your Network

    Sponsored by: Aruba Networks

    Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!

  • A Business Guide to MPLS IP VPN Migration: Five Critical Factors

    Sponsored by: XO Communications

    Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs.

  • Key Considerations for MPLS IP-VPN Success

    Sponsored by: XO Communications

    Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!

  • How to Accurately Detect and Correct Packet Loss

    Sponsored by: Silver Peak

    This paper explains how packet loss can be properly measured throughout an enterprise, and what can be done to mitigate its effects in real-time.

  • Remote Access Problems: BYOD Muddies the Water

    Sponsored by: Carousel Industries

    This expert E-Guide from SearchEnterpriseWAN.com explores the challenges many organizations face when it comes to remote access and pays special attention to the security concerns BYOD brings to your enterprise.

  • Network Evolution E-Zine: Network security in a world of mobile workers

    Sponsored by: TechTarget Networking

    In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.

  • MPLS VPN Tutorial: What you should know

    Sponsored by: XO Communications

    In this expert E-Guide from SearchEnterpriseWAN.com, explore the next generation of networks: Multiprotocol Label Switching (MPLS) networks.

  • Cisco CleanAir Technology

    Sponsored by: Cisco Systems, Inc.

    Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.

  • Ten Steps to an Enterprise Mobility Strategy

    Sponsored by: iPass Inc.

    Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy.

  • Ethernet and VPN in the WAN

    Sponsored by: AT&T Corp

    Network-based IP VPN and Ethernet WAN services are two of the most popular WAN connectivity options for enterprises and medium-sized businesses. Learn if one or the other – or both – is best for your enterprise.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.