VPN White Papers
-
Computer Weekly – 10 December 2024: On the road to change at Aston Martin
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Aston Martin's CIO to find out how tech is helping tackle the challenges facing the automotive sector. The new National Cyber Security boss explains the need to be vigilant against growing online threats. We also examine the future of secure remote connectivity in the cloud era. Read the issue now.
-
A Computer Weekly buyer's guide to video conferencing and collaboration
Sponsored by: TechTarget ComputerWeekly.comIn this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: TechTarget ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Cisco ASA 5500 Series Adaptive Security Appliances
Sponsored by: Cisco Systems, Inc.Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
-
Collaboration solutions: Solutions for small and medium business
Sponsored by: IBMCheck out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
-
Airports Use Network Virtualization to Consolidate and Scale Operations
Sponsored by: Cisco Systems, Inc.The Cisco Catalyst 6500 Series Switch with Supervisor Engine 720-3BXL enabled Unique at Zurich Airport to successfully implement network virtualization using MPLS VPN technology.
-
Emerging Multicast VPN Applications
Sponsored by: Juniper Networks, Inc.This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
-
The Virtual Office Checklist
Sponsored by: Cisco Systems, Inc.The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
-
Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
Sponsored by: Juniper Networks, Inc.Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
-
Network Security Checklist
Sponsored by: Cisco Systems, Inc.Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Patch Tuesday Alerts
Sponsored by: LumensionEach Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
-
Cisco 870 Series Integrated Services Routers for Small Offices
Sponsored by: Cisco Systems, Inc.The Cisco 850 and Cisco 870 series routers support a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals.
-
Cisco PIX 506E Security Appliance
Sponsored by: Cisco Systems, Inc.The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-bu...
-
Cisco 1800 Series Integrated Services Routers Fixed Configuration Models
Sponsored by: Cisco Systems, Inc.The Cisco® 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, scalable delivery of mission-critical business applications.
-
Clean VPN Approach to Secure Remote Access
Sponsored by: SonicWALLIn this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
-
Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution
Sponsored by: Citrix Online - GotoMyPCJohns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
-
Realizing Business Value in Managed File Transfer
Sponsored by: GlobalscapeManaged File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
-
Solution Brief: Leveraging the Internet for Branch Office Connectivity
Sponsored by: BlueCoatTraditional WAN architectures will soon reach their limits in terms of their ability to provide fast, safe connectivity between all users and applications-wherever they are located.
-
Pitney Bowes Case Study
Sponsored by: Virtela Communications, Inc.When Pitney Bowes needed to extend the company's internal enterprise applications to its offices overseas, it required a solution for connecting securely to the corporate IT network.
-
Cisco PIX 501 Security Appliance
Sponsored by: Cisco Systems, Inc.The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance.
-
Cisco 2800 Series Integrated Services Routers
Sponsored by: Cisco Systems, Inc.The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections.
-
Exploiting IT Networks to Create Sticky Services
Sponsored by: Alcatel-LucentThis paper has examined the kinds of sticky services deployable today over advanced IP networks.