Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

VPN

A Virtual Private Network (VPN) is a private communications network often used within a company, or by several companies or organizations, to communicate confidentially over a publicly accessible network. VPN message traffic can be carried over a public networking infrastructure (e.g. the Internet) on top of standard protocols.
Results 26 - 50 of 78Sort Results By: Published Date | Title | Company Name
Webinar Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl
    
Cisco
Webinar Published By: Cisco     Published Date: Jan 28, 2009
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks. Though they look quite similar, routers and switches perform very different functions in a network.
Tags : 
cisco, networking basics, routing and switching, essential networking basics, switches
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 28, 2009
Here are some things to consider when choosing Cisco SMB Solutions that enable you and your colleagues to work from anywhere.
Tags : 
cisco, virtual office, vpn, firewall, virtual private network
    
Cisco
White Paper Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.
Tags : 
mobility, wireless, remote workers, road warrior, global roaming connectivity
    
Motorola
Webinar Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security
    
Axeda Corporation
White Paper Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security
    
Axeda Corporation
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
Following the sale of a company division housing its corporate data center, Source Interlink had to relocate core IT operations. Teaming with CDW, they were able to not only relocate, but lower capital and operating costs, reduce their carbon footprint, and increase efficiency.
Tags : 
data, center, optimization, cdn, interlink
    
CDW Vmware
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits
    
CDW Vmware
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.
Tags : 
modernize, desktop, data, application, access
    
CDW Vmware
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
Your business counts on you for reliable, secure, responsive IT services. It's a nonstop job, with no time off to figure out complex new technologies or wrestle with software solutions designed for larger firms. Virtualization is the way to simplify your IT without unnecessary complexity or cost.
Tags : 
ebook, reliable, secure, simplify, infrastructure
    
CDW Vmware
White Paper Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : 
public, cloud, private, technologies, technology
    
Equinix
White Paper Published By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : 
virtualization, data center, datacenters, consolidate, network
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Feb 18, 2012
This paper outlines the compelling benefits of consolidating networking services, and details why competing efforts pursued by F5 technology come up short for critical ADC consolidation projects.
Tags : 
virtualization, data center, datacenters, consolidate, network
    
Citrix Systems
White Paper Published By: ScriptLogic     Published Date: Aug 23, 2011
Free Whitepaper | The Definitive Guide to Logon Script Replacement
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn
    
ScriptLogic
White Paper Published By: ScriptLogic     Published Date: Aug 18, 2011
One of the biggest complexities in desktop management is the fact that no organization has a single desktop configuration and need. There should and there is a better way. Download this whitepaper to find out more.
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn
    
ScriptLogic
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: Mitel     Published Date: Dec 28, 2010
The Mitel Freedom architecture provides organizations with a single stream, software-based
Tags : 
voip, pbx, wireless, mobility, ivr
    
Mitel
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
White Paper Published By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : 
active directory, bandwidth management, convergence, distributed computing, ethernet networking
    
xmannnnn
White Paper Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Tags : 
buying guide, buyers guide, vpn purchase, ssl, vpn
    
Aventail
White Paper Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce
    
Aventail
White Paper Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn
    
Aventail
White Paper Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity
    
Aventail
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.