VPN White Papers

A Virtual Private Network (VPN) is a private communications network often used within a company, or by several companies or organizations, to communicate confidentially over a publicly accessible network. VPN message traffic can be carried over a public networking infrastructure (e.g. the Internet) on top of standard protocols.
Results 1 - 25 of 72Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jul 15, 2013

From cloud-based voice and video to comprehensive BYOD and mobility support to deployment costs, this report highlights six key areas to evaluate in collaboration offerings.

Tags : cisco mobility, cisco, collaboration, enterprise collaboration, mobile enterprise, mobile workers, collaboration, byod platforms
    
By: Sophos     Published Date: May 09, 2013

This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.

Tags : network protection, sophos, buyers guide, security, application security, security software, firewall, vpn
    
By: SunGard     Published Date: Aug 13, 2012

Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.

Tags : sungard, recovery, service, organizations, disaster, recovery, survival, recovery
    
By: Intel Corp.     Published Date: Aug 08, 2012

This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.

Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
By: Equinix     Published Date: Jul 31, 2012

This GigaOM Pro paper explores what functions to consider when selecting and working with hosting providers as it relates to the entire value chain of function and performance. Get your complimentary 6-page report now.

Tags : gigaom, pro, enterprise, cloud, equinox, availability, security, platforms
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, network architecture, network management, network performance, network performance management
    
By: ScriptLogic     Published Date: Aug 23, 2011

Since its introduction in 2000, Group Policy has been a hit. Tens of thousands of organizations worldwide use it to create more consistent desktops for their users, to deploy software packages, to secure their computers, and more.

Tags : scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria
    
By: Cisco     Published Date: Apr 14, 2011

Discover simple, affordable ways to protect your business assets while providing appropriate access to information.

Tags : cisco, data security, online threats., risk exposure, small business networks, vpn, hacker detection, identity management
    
By: WatchGuard Technologies     Published Date: Apr 21, 2010

Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.

Tags : watchguard technologies, unified threat management, utm, network humming, security, firewall, vpn, tco
    
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.

Tags : microsoft, windows phone, mobile security, security tools, smartphone, network security, antivirus, backup
    
By: Astaro     Published Date: Aug 10, 2009

The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.

Tags : astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet
    
By: Astaro     Published Date: Aug 10, 2009

The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.

Tags : inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter
    
By: Astaro     Published Date: Aug 10, 2009

The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.

Tags : astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn
    
By: Astaro     Published Date: Aug 10, 2009

Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.

Tags : astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls
    
By: Astaro     Published Date: Aug 10, 2009

Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.

Tags : hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam
    
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.

Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
By: Cisco     Published Date: Jan 29, 2009

The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.

Tags : cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention
    
By: Cisco     Published Date: Jan 28, 2009

Whatever the size of your organization, a business-class network is within your reach. By understanding and taking some simple steps, you can implement a network infrastructure that provides your company with significant and substantive benefits. From empowering your employees to greatly improving customer service, networking technology can have a lasting impact on your business.

Tags : cisco, network, routing, operational efficiency, switches, lan, wan, vpn
    
By: Cisco     Published Date: Jan 28, 2009

A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.

Tags : cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy
    
By: Cisco     Published Date: Jan 28, 2009

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.

Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
By: Cisco     Published Date: Jan 28, 2009

The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.

Tags : cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall
    
By: Cisco     Published Date: Jan 28, 2009

When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks. Though they look quite similar, routers and switches perform very different functions in a network.

Tags : cisco, networking basics, routing and switching, essential networking basics, switches, routers, virtual private network, vpn
    
By: Cisco     Published Date: Jan 28, 2009

Here are some things to consider when choosing Cisco SMB Solutions that enable you and your colleagues to work from anywhere.

Tags : cisco, virtual office, vpn, firewall, virtual private network, networking costs, recruitment reach, remote employees
    
By: Motorola     Published Date: Feb 06, 2008

In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.

Tags : mobility, wireless, remote workers, road warrior, global roaming connectivity, mobile device, cellular data cards, vpn
    
By: Axeda Corporation     Published Date: Nov 14, 2007

How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.

Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Start   Previous   1 2 3    Next    End