Information Security Research Library

Powered by Bitpipe.com

VPNResearch

  • Mobilize your Corporate Content and Apps

    Sponsored by: IBM

    This white paper explores how organizations can embrace, plan, and deploy a comprehensive mobile strategy that harnesses the power of mobility with secure access to business resources.

  • Carrier Ethernet: Transforming Business Telecommunications

    Sponsored by: Cox Communications, Inc.

    This white paper elucidates the process of selecting the best services for your organization's WAN needs, including Private Line, Layer 2 VPNs, and Layer 3 VPNs.

  • Cox Metro Ethernet Services

    Sponsored by: Cox Communications, Inc.

    This white paper introduces two network solutions, ELAN and MPLS IP-VPN, and helps you to discover which is better suited for your enterprise's networking needs.

  • Amazon Virtual Private Cloud Connectivity Options

    Sponsored by: Amazon Web Services

    This document describes and evaluates several common virtual network connectivity options, including integrating remote customer networks with Amazon VPC, as well as interconnecting multiple Amazon VPCs into a contiguous virtual network.

  • VPN WAN Design Guide

    Sponsored by: Cisco Systems, Inc.

    This exclusive white paper examines a VPN solution that can help your organization securely communicate between remote site locations over the internet. Read on to learn implementation tips, best practices, and more.

  • Network protection and UTM Buyers Guide

    Sponsored by: Sophos, Inc.

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • AlienVault and the MSSP Program Overview

    Sponsored by: AlienVault

    Watch this web cast to get an inside scoop on all that MSSP has to offer.

  • Computer Weekly Buyer's Guide to managing identity & access

    Sponsored by: TechTarget

    With the increasing rise of the BYOD trend, managing identity and access to data across a range of devices is ever more important. In this buyer's guide, Computer Weekly looks at securing productivity, how to make the most of an employee's own digital identity and how to find a balance between the needs of the business and regulatory requirements.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • Single Point of Access, Single Point of Control

    Sponsored by: Citrix

    Read on to learn how desktop virtualization can help support remote connectivity better than VPN.

  • WAN Speak Musings – Volume III

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.

  • How To Secure Online Activities

    Sponsored by: Global Knowledge

    The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.

  • New Virtual Networking Technologies Make Convergence Real

    Sponsored by: SearchSecurity.com

    This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.

  • Intelligent Authentication and User Access Balancing Security and Convenience

    Sponsored by: CA Technologies.

    Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.

  • IT Security Case Studies

    Sponsored by: ComputerWeekly.com

    Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.

  • Trends in Enterprise Mobility

    Sponsored by: ComputerWeekly.com

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

  • Network Evolution – March 2014

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • File Sync and Share: Risks, Rewards, Considerations, and Deployment Options

    Sponsored by: Dropbox for Business

    This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.

  • BYOD: Bring Your Own Device – or Bring Your Own Danger?

    Sponsored by: WatchGuard Technologies, Inc.

    This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • The Great Multi Protocol Label Switching (MPLS) Migration

    Sponsored by: SingTel

    This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.

  • The Business Platform Choice: Delivering IT - Business Integration with IPVPN

    Sponsored by: SingTel

    This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.

  • Application Optimization for the Network

    Sponsored by: SearchNetworking.com

    In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

See more topics related to: VPN

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.