Virtual Private Networking Reports

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 15 Mar 2021 | Published: 01 Mar 2021

TechTarget ComputerWeekly.com

Making the Right Move to a Managed Service Provider for SSL VPN
sponsored by MegaPath Inc.
WHITE PAPER: Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.

Exploiting IT Networks to Create Sticky Services
sponsored by Alcatel-Lucent
WHITE PAPER: This paper has examined the kinds of sticky services deployable today over advanced IP networks.
Posted: 15 Jan 2008 | Published: 01 Jan 2008

Alcatel-Lucent

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

The Great Multi Protocol Label Switching (MPLS) Migration
sponsored by Singtel
WHITE PAPER: This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Singtel

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 17 Jan 2011 | Published: 17 Jan 2011

Copiun

Top VPNs secretly owned by Chinese firms
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Cisco PIX 506E Security Appliance
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-bu...
Posted: 10 Jul 2008 | Published: 01 Dec 2007

Cisco Systems, Inc.