ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Research

  • The Ten Tenets of an Effective SASE Solution

    Sponsored by: Palo Alto Networks

    As networks become increasingly dispersed, organizations struggle to keep pace and ensure security, privacy, and integrity. Recently, organizations have begun incorporating secure access service edge (SASE) frameworks. This e-book goes in-depth into what SASE is, and 10 principles required to make them effective.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Sponsored by: ComputerWeekly.com

    Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.

  • New Virtual Networking Technologies Make Convergence Real

    Sponsored by: SearchSecurity.com

    This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.

  • New Options to Enable Remote Access in the Network

    Sponsored by: SearchNetworking.com

    This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • Avoid Multicloud Integration Costs

    Sponsored by: Rackspace

    Experts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs.

  • Agility in the Data Center

    Sponsored by: SearchNetworking.com

    This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.

  • Minimise the Security Risks of Mobile Email Access

    Sponsored by: Hewlett-Packard Enterprise

    This expert e-guide will teach you how to put airtight security measures on remote e-mail access.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Computer Weekly – 22 April 2014: Adapting to life after Heartbleed

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

  • Computer Weekly – 15 April 2014: Spies in the VPN

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.

  • Network Evolution – March 2014

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • File Sync and Share: Risks, Rewards, Considerations, and Deployment Options

    Sponsored by: Dropbox for Business

    This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.

  • BYOD: Bring Your Own Device – or Bring Your Own Danger?

    Sponsored by: WatchGuard Technologies, Inc.

    This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • The Great Multi Protocol Label Switching (MPLS) Migration

    Sponsored by: SingTel

    This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

See more topics related to: VPN

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences