ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Research

  • 5 Steps to Understanding Cloud Computing Networks

    Sponsored by: Dell, Inc. and Intel®

    This guide discusses the two missions of cloud computing networks, as well as how to accomplish these goals. Also included are five requirements for successful cloud computing networks.

  • How a Techie Built a Network That Cuts Costs by 50%

    Sponsored by: Cisco Systems, Inc.

    Discover how a technical supervisor used network technology to help his company slash phone service costs, improve security and service, and add four satellite offices without adding more IT support.

  • The Ultralight Branch

    Sponsored by: Aerohive Networks

    Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • The Evolving Threat Landscape

    Sponsored by: Juniper Networks, Inc.

    This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.

  • Manchester Essex Regional School District: Virtualization helps a Massachusetts school district deliver better education while reducing costs, IT staff burdens and environmental impact

    Sponsored by: VMware, Inc.

    The Manchester Essex Regional School District was looking to build a new school for its 8500 student body, tasking the IT department with finding the most effective way to help build and manage an energy-efficient IT infrastructure. This white paper highlights how VMware data center virtualization and other software helped them achieve their goals.

  • Field Service Mobility Best Practices

    Sponsored by: NetMotion Wireless

    Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.

  • The Definitive Guide to Telework

    Sponsored by: Aerohive Networks

    This e-book looks at teleworking from all angles, examining what’s driving and potentially hindering its adoption, the technical and cultural requirements to support teleworking, and the considerations enterprises should make to ensure they have what they need for an effective telework deployment in their workplace.

  • E-Guide: MPLS VPN basics

    Sponsored by: MegaPath Inc.

    This e-guide discusses the ins and outs of MPLS VPNs and traditional virtual private networks. Uncover the differences, advantages and disadvantages of each one.

  • E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?

    Sponsored by: Thawte Inc.

    This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.

  • Backup Mobile and Remote Users Securely, With or Without a VPN

    Sponsored by: Copiun

    This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.

  • How Can You Prepare for the Consumerization of IT

    Sponsored by: DynTek & McAfee

    The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.

  • SuperMassive E10000 Series Next-Generation Firewall

    Sponsored by: SonicWALL

    The SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds.

  • Backup Mobile and Remote Users Securely, With or Without a VPN

    Sponsored by: Copiun

    This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.

  • Case Study: Capita Group PLC

    Sponsored by: Druva

    Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions.

  • E-Book: Taking Mobile CRM Beyond the Sales Force

    Sponsored by: Sybase, an SAP company

    Mobility was going to be "the next big thing" in CRM but didn’t pan out, with "road warriors" frustrated with user interfaces meant for a PC. But the success of smart phones has changed the game. This e-book helps enterprises understand the marketplace for devices, applications and managing it all in order to create a mobile CRM program.

  • The Application Usage and Risk Report

    Sponsored by: Palo Alto Networks

    The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.

  • The Future of Business-Critical Networking

    Sponsored by: Cavalier

    Your network must deliver non-stop services to support business operations and be highly scalable to support future growth. It must also address multiple communications needs cost-effectively and flexibly. The communications network must meet the demands of a dynamic business-critical environment. Read this white paper to learn more.

  • VPLS: The Switched Ethernet

    Sponsored by: AT&T Corp

    Virtual Private LAN Service is evolving into the next "in" technology. AT&T defines it as any-to-any Ethernet that can be either metro or long haul. VPLS allows enterprises to scale bandwidth and is a good fit for customers who require meshed connectivity and want to control and manage routing.

  • MegaPath Site-to-Site MPLS VPN

    Sponsored by: MegaPath Inc.

    Your employees in remote locations need the same fast, reliable, secure and cost-effective access to information and applications as your employees at headquarters. MegaPath Site-to-Site MPLS VPN is the simple solution. Read this white paper to learn how to MegaPath Site-to-Site MPLS VPN means more security, more selection, and more service.

  • Making the Right Move to a Managed Service Provider for SSL VPN

    Sponsored by: MegaPath Inc.

    Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.

  • The MPLS Network: A Future-Proof Engine for Voice-Data Convergence

    Sponsored by: MegaPath Inc.

    Voice and data on a single wire is an exciting network development. MPLS technology, which enables voice and data to be transported together on wide area networks (WANs), has matured to provide a platform for almost unimaginable communications and cloud computing possibilities. Learn more about MPLS by reading this white paper.

  • IT Decision Checklist: Remote Access

    Sponsored by: VirtualArmor

    The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.

  • Vault-Like Protection for 200 Financial Services Locations

    Sponsored by: WatchGuard Technologies, Inc.

    Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it

  • Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind

    Sponsored by: CDW Corporation

    Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.