Internet Protocol Security Virtual Private Networks White Papers

(View All Report Types)
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1
sponsored by Global Knowledge
WHITE PAPER: Access this exclusive paper to find out how the Communication Manager, once defined as an Entity within the Avaya Aura Session Manager, can be configured as a feature server within a sequenced application.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Global Knowledge

Transformative Service Management - Reinventing Service Management for the New Style of IT
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper details the changes that have transformed IT and how they should be viewed as an opportunity for the department to reassert its value.
Posted: 26 Nov 2013 | Published: 22 Oct 2013

Hewlett Packard Enterprise

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Outsourcing IT Projects: 12 Success Factors to Consider
sponsored by Rackspace Technology
WHITE PAPER: This guide explores the 12 success factors IT professionals should consider when looking to outsource IT projects to managed hosting or the cloud.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Rackspace Technology

Empowering Drones to Support UK Safety Officials
sponsored by FourNet
WHITE PAPER: In this white paper, learn how 4net Technology is helping to address the shortcomings of drones with a Mobile Drone Kit that utilizes Avaya Equinox, a powerful gateway for calling messaging, conferencing and collaboration.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

FourNet

MarketScope for Unified Communications for the SMB Market, North America
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines the current state of the UC market for SMBs, detailing which providers can give your organization the tools and solutions you need to thrive in today's business environment.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Cisco Systems, Inc.

Unified Communications Management Before and After Deployment
sponsored by Nectar Corp
WHITE PAPER: A successful UC rollout should test voice performance -- and video, if applicable -- before and after deployment. In this expert e-guide, Irwin Lazar of Nemertes Research, explains how organizations can minimize operational costs and maximize user satisfaction with proactive unified communications management and testing before and after deployment.
Posted: 21 Feb 2017 | Published: 17 Feb 2017

Nectar Corp