VPN White Papers

A Virtual Private Network (VPN) is a private communications network often used within a company, or by several companies or organizations, to communicate confidentially over a publicly accessible network. VPN message traffic can be carried over a public networking infrastructure (e.g. the Internet) on top of standard protocols.
Results 1 - 25 of 77Sort Results By: Published Date | Title | Company Name
By: iboss     Published Date: Jan 22, 2018

The conversation around the cloud has been booming of late, with the topic showing up everywhere from IT back offices to Fortune 500 C-Suites.

Tags : iboss, vpn, cloud applications, cloud computing, vpn, infrastructure, distributed computing, internet security
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control, email security, hacker detection, mobile workers, smart phones, wireless security, data protection, desktop management, cloud computing, business technology, mobile device management
    
By: Citrix Systems     Published Date: Apr 15, 2015

App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, network security, vpn, application integration, best practices, productivity, cloud computing
    
By: Comcast Business     Published Date: Mar 24, 2015

Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using Private Lines, Frame Relay or IP VPNs over the Internet. Ethernet services support hub and spoke topologies but also support an “any-to-any” network topology similar to a LAN but delivered over a wide area. This latter capability is unique to Ethernet services and cannot be cost effectively delivered using legacy point-to-point technologies such as Frame Relay or IP VPNs. This paper discusses two options for multi-site connectivity using Ethernet services. One option discusses the classical hub and spoke topology using Ethernet Virtual Private Lines (EVPL). The other option discusses the “any-to-any” topology using an Ethernet Private LAN (EP-LAN) service. Through examples, the paper illustrates the capabilities of the two approaches and their benefits.

Tags : multi-site connectivity, ethernet, security, ip transparency, performance, ep-lan, evpl, bandwidth management, ethernet networking, infrastructure, ip networks, local area networking, network management, quality of service, vpn
    
By: XO Communications     Published Date: Jul 17, 2014

MPLS IP-VPN network usage continues to grow and with good reason. MPLS IP-VPN provides secure, reliable, cost-effective and scalable answers for today’s enterprise networking needs.

Tags : cloud-enabled network, mpls ip-vpn, cost-effective, improve disaster, recovery, infrastructure, ip networks, tcp/ip protocol, vpn, wireless application software, wireless infrastructure, cloud computing
    
By: Cisco     Published Date: Jul 15, 2013

From cloud-based voice and video to comprehensive BYOD and mobility support to deployment costs, this report highlights six key areas to evaluate in collaboration offerings.

Tags : cisco mobility, cisco, collaboration, enterprise collaboration, mobile enterprise, mobile workers, collaboration, byod platforms, byod, video conferencing, ip networks, remote access, small business networks, vpn, mobile computing, wireless communications, wireless infrastructure, wireless messaging, customer interaction service, enterprise software
    
By: Sophos     Published Date: May 09, 2013

This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.

Tags : network protection, sophos, buyers guide, security, application security, security software, firewall, vpn, scanning, spam, network performance, network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, intrusion detection, intrusion prevention, data protection
    
By: SunGard     Published Date: Aug 13, 2012

Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.

Tags : sungard, recovery, service, organizations, disaster, recovery, survival, recovery, drsps, security, storage, infrastructure, server hardware, servers, vpn, business intelligence, business management, business metrics, risk management, database development
    
By: Intel Corp.     Published Date: Aug 08, 2012

This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.

Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage, it management, data management, bandwidth management, grid computing, infrastructure, internetworking hardware, server hardware
    
By: Equinix     Published Date: Jul 31, 2012

This GigaOM Pro paper explores what functions to consider when selecting and working with hosting providers as it relates to the entire value chain of function and performance. Get your complimentary 6-page report now.

Tags : gigaom, pro, enterprise, cloud, equinox, availability, security, platforms, infrastructure, isv, vpn, cio, platforms, it management, wireless, utility computing, wide area networks, it spending, business intelligence, data protection
    
By: ScriptLogic     Published Date: Aug 23, 2011

Since its introduction in 2000, Group Policy has been a hit. Tens of thousands of organizations worldwide use it to create more consistent desktops for their users, to deploy software packages, to secure their computers, and more.

Tags : scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria, ip networks, local area networking, service management
    
By: Cisco     Published Date: Apr 14, 2011

Discover simple, affordable ways to protect your business assets while providing appropriate access to information.

Tags : cisco, data security, online threats., risk exposure, small business networks, vpn, hacker detection, identity management, internet security, network security appliance, wifi, wireless security
    
By: WatchGuard Technologies     Published Date: Apr 21, 2010

Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.

Tags : watchguard technologies, unified threat management, utm, network humming, security, firewall, vpn, tco, anti spam, anti spyware, anti virus, firewalls, security management, total cost of ownership
    
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.

Tags : microsoft, windows phone, mobile security, security tools, smartphone, network security, antivirus, backup, device encryption, mobile firewall, vpn, backup and recovery, anti virus, encryption, firewalls, smart phones, wireless phones, wireless security
    
By: Astaro     Published Date: Aug 10, 2009

The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.

Tags : inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter, security gateway, internet security, internet, firewall, proxy, security, vpn, firewalls
    
By: Astaro     Published Date: Aug 10, 2009

The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.

Tags : astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn, 320, gateway, protection, content filtering, kauffman, protection, security, anti spam, internet security, security management
    
By: Astaro     Published Date: Aug 10, 2009

Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.

Tags : astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
By: Astaro     Published Date: Aug 10, 2009

Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.

Tags : hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam, anti malware, astaro, internet security, content filtering, malware, security, cisco, sonicwall, anti spam, anti spyware, hacker detection, security management
    
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.

Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
By: Cisco     Published Date: Jan 28, 2009

Whatever the size of your organization, a business-class network is within your reach. By understanding and taking some simple steps, you can implement a network infrastructure that provides your company with significant and substantive benefits. From empowering your employees to greatly improving customer service, networking technology can have a lasting impact on your business.

Tags : cisco, network, routing, operational efficiency, switches, lan, wan, vpn, virtual private network, network foundation, networking, infrastructure, local area networking, wide area networks
    
By: Cisco     Published Date: Jan 28, 2009

A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.

Tags : cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy, password policy, cisco asa 5500, secure vpn, networking, security, local area networking, vpn, wide area networks, anti virus, identity management, security management
    
By: Cisco     Published Date: Jan 28, 2009

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.

Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security, networking, security, anti virus, email security, encryption, firewalls
    
Start   Previous   1 2 3 4    Next    End