ComputerWeekly.com Research Library

Powered by Bitpipe.com

VPN Software White Papers

  • A Computer Weekly buyer's guide to video conferencing and collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: TechTarget ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Computer Weekly – 15 April 2014: Spies in the VPN

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.

  • Network Evolution – March 2014

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • The Business Platform Choice: Delivering IT - Business Integration with IPVPN

    Sponsored by: Singtel

    This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.

  • Next Generation Enterprise WAN Regional WAN Remote Access VPN overview

    Sponsored by: Cisco Systems, Inc.

    Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.

  • Next Generation Enterprise WAN DMVPN

    Sponsored by: Cisco Systems, Inc.

    Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • The Virtual Office Checklist

    Sponsored by: Cisco Systems, Inc.

    The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.

  • DePaul University Case Study

    Sponsored by: SonicWALL

    In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.

  • IPSEC VS. VPN: Transition Criteria and Methodology

    Sponsored by: SonicWALL

    This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.

  • 7 Key Requirements for Remote Access

    Sponsored by: Citrix

    Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.