IPSec White Papers
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
Sponsored by: Cisco Systems, Inc.This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
-
SingTel IP VPN Manufacturing Industry
Sponsored by: Do Not Use - Singapore Telecommunications LtdIP VPN technology is a viable solution for manufacturing companies seeking to weave their operations into the rapidly changing industry. It has unleashed a new era of IT infrastructure and this white paper provides the details.
-
IPSEC VS. VPN: Transition Criteria and Methodology
Sponsored by: SonicWALLThis white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.