VPNs Reports

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Exploiting IT Networks to Create Sticky Services
sponsored by Alcatel-Lucent
WHITE PAPER: This paper has examined the kinds of sticky services deployable today over advanced IP networks.
Posted: 15 Jan 2008 | Published: 01 Jan 2008

Alcatel-Lucent

Next Generation Enterprise WAN Regional WAN Remote Access VPN overview
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

E-Guide: MPLS VPN basics
sponsored by MegaPath Inc.
EGUIDE: This e-guide discusses the ins and outs of MPLS VPNs and traditional virtual private networks. Uncover the differences, advantages and disadvantages of each one.
Posted: 31 May 2011 | Published: 31 May 2011

MegaPath Inc.

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Realizing Business Value in Managed File Transfer
sponsored by Globalscape
WHITE PAPER: Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

Globalscape

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterpriseĀ applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by TechTarget Networking
EZINE: In the April edition of SearchNetworking.comā€™s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

TechTarget Networking