Internet Protocol Security VPN Reports

DePaul University Case Study
sponsored by SonicWALL
CASE STUDY: In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
Posted: 15 Nov 2007 | Published: 01 Aug 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011

Thawte Inc.

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.
Posted: 26 Apr 2024 | Published: 30 Apr 2024

TechTarget ComputerWeekly.com

Computer Weekly - 23 August 2022: How digital technology rescued Merlin
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.
Posted: 19 Aug 2022 | Published: 23 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

TechTarget ComputerWeekly.com