Information Security Research Library

Powered by


Early VPN concentrators effectively enabled trusted laptops to gain access over the Internet. But they made assumptions about remote devices and users that have proven untenable in today's increasingly mobile and diverse business environment. To successfully battle the escalating threat landscape and comply with privacy regulations, companies can no longer afford VPNs that open gaping holes into their network.

This webcast details emerging approaches to secure remote access that can be used to complement or even replace conventional VPN concentrators and covers the advantages and disadvantages of more contemporary secure remote access methods.

Check out this featured webcast and learn more about:

  • New business drivers that are reshaping secure remote access
  • The continuing evolution of SSL VPNs - why one size does NOT fit all
  • Keeping nomadic workforces productive with Mobile VPNs
  • VPN alternatives - secure application portals, secure desktop access
  • Limiting risk exposure through identity and role-based access control
  • Stopping breaches before they start with NAC and endpoint security


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.