Internet Protocol Security VPN Reports

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

The Essential IT Automation Success Checklist
sponsored by Red Hat
PRODUCT OVERVIEW: Automation is a top business initiative for 60% of organizations. In this product overview, discover 5 ways you can use Red Hat Ansible Automation Platform to simplify your company’s automation management efforts.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

How to Achieve a 3X ROI with Slack
sponsored by Slack
WHITE PAPER: Today's new remote reality makes collaboration tools more important than ever. In this white paper, learn about a study conducted by Forrester Consulting on behalf of Slack which zeroed in on the benefits teams saw after switching to Slack.
Posted: 18 Jan 2024 | Published: 02 Dec 2023

Slack

CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists
sponsored by TechTarget ComputerWeekly.com
EZINE: The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.
Posted: 04 Aug 2022 | Published: 25 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.
Posted: 25 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com