Internet Protocol Security Virtual Private Networks Reports

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

4 IT Automation Myths Dispelled
sponsored by Red Hat
EBOOK: Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

MicroScope – July 2023: The pressure to deliver
sponsored by MicroScope
EZINE: With technology always changing, it can feel like an impossible feat to keep up – we speak to experts about how the channel handles rapid change and the pressure this places on partners to meet customer expectations. Also read about major themes of the market and how the topic of return on investments needs to stretch beyond economics
Posted: 06 Jul 2023 | Published: 07 Jul 2023

MicroScope

The Evolving CIO role: from IT Operator to Business Strategist
sponsored by BMC
EGUIDE: Since its beginnings nearly 40 years ago, the job of an organization's top IT executive has involved the cost-effective and strategic management of IT systems. But today's CIOs must also understand how IT drives business transformation.
Posted: 21 Jul 2022 | Published: 20 Jul 2022

BMC

The power of AI and Automation: Productivity and agility
sponsored by IBM
VIDEO: Forward-thinking executives are harnessing data-driven innovation to improve performance, and in this Data Story IBM looks at research that shows how leading companies are using data as an asset and using intelligent automation to as a means to growth and operational advantage.
Posted: 02 Apr 2024 | Premiered: 01 Apr 2024

IBM