VPN Research
-
Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
Sponsored by: CDW CorporationTaking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
-
How to Cut Overhead Costs Right Now: Connect Remote Workers, Using VPN Security
Sponsored by: Cisco Systems, Inc.Giving remote workers easy and secure access to your network with virtual private network (VPN) technology can result in big savings.
-
Collaboration solutions: Solutions for small and medium business
Sponsored by: IBMCheck out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
-
Airports Use Network Virtualization to Consolidate and Scale Operations
Sponsored by: Cisco Systems, Inc.The Cisco Catalyst 6500 Series Switch with Supervisor Engine 720-3BXL enabled Unique at Zurich Airport to successfully implement network virtualization using MPLS VPN technology.
-
Emerging Multicast VPN Applications
Sponsored by: Juniper Networks, Inc.This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
-
The Virtual Office Checklist
Sponsored by: Cisco Systems, Inc.The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
-
Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
Sponsored by: Juniper Networks, Inc.Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
-
Network Security Checklist
Sponsored by: Cisco Systems, Inc.Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
-
Cisco ASA 5500 Series Adaptive Security Appliance
Sponsored by: Cisco Systems, Inc.In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Patch Tuesday Alerts
Sponsored by: LumensionEach Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
-
Cisco PIX 506E Security Appliance
Sponsored by: Cisco Systems, Inc.The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-bu...
-
Cisco 1800 Series Integrated Services Routers Fixed Configuration Models
Sponsored by: Cisco Systems, Inc.The Cisco® 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, scalable delivery of mission-critical business applications.
-
Cisco 870 Series Integrated Services Routers for Small Offices
Sponsored by: Cisco Systems, Inc.The Cisco 850 and Cisco 870 series routers support a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals.
-
Clean VPN Approach to Secure Remote Access
Sponsored by: SonicWALLIn this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
-
Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution
Sponsored by: Citrix Online - GotoMyPCJohns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
-
Realizing Business Value in Managed File Transfer
Sponsored by: GlobalscapeManaged File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
-
Solution Brief: Leveraging the Internet for Branch Office Connectivity
Sponsored by: BlueCoatTraditional WAN architectures will soon reach their limits in terms of their ability to provide fast, safe connectivity between all users and applications-wherever they are located.
-
Pitney Bowes Case Study
Sponsored by: Virtela Communications, Inc.When Pitney Bowes needed to extend the company's internal enterprise applications to its offices overseas, it required a solution for connecting securely to the corporate IT network.
-
Cisco PIX 501 Security Appliance
Sponsored by: Cisco Systems, Inc.The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance.
-
Cisco 2800 Series Integrated Services Routers
Sponsored by: Cisco Systems, Inc.The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections.
-
Exploiting IT Networks to Create Sticky Services
Sponsored by: Alcatel-LucentThis paper has examined the kinds of sticky services deployable today over advanced IP networks.
-
Network Access Control: User and Device Authentication
Sponsored by: Intel CorporationNetworking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
-
Integrating Mobile Access into Your VPN Environment
Sponsored by: AT&T CorpEnterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
-
Meeting Branch Office Business Needs for Security and Networking
Sponsored by: Juniper Networks, Inc.Download this white paper and discover an ideal branch-office security strategy that provides fast and secure site-to-site VPN connections. You will also learn about effective tactics that help stop viruses, worms, Spyware and other threats.