SearchSecurity.co.UK Research Library

Powered by Bitpipe.com

VPNResearch

  • Computer Weekly – 22 April 2014: Adapting to life after Heartbleed

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

  • Computer Weekly – 15 April 2014: Spies in the VPN

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.

  • Computer Weekly Buyer's Guide to managing identity & access

    Sponsored by: TechTarget

    With the increasing rise of the BYOD trend, managing identity and access to data across a range of devices is ever more important. In this buyer's guide, Computer Weekly looks at securing productivity, how to make the most of an employee's own digital identity and how to find a balance between the needs of the business and regulatory requirements.

  • Network Evolution – March 2014

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • Single Point of Access, Single Point of Control

    Sponsored by: Citrix

    Read on to learn how desktop virtualization can help support remote connectivity better than VPN.

  • A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • WAN Speak Musings – Volume III

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.

  • How To Secure Online Activities

    Sponsored by: Global Knowledge

    The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.

  • IT Security Case Studies

    Sponsored by: ComputerWeekly.com

    Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.

  • Application Optimization for the Network

    Sponsored by: SearchNetworking.com

    In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.

  • Trends in Enterprise Mobility

    Sponsored by: ComputerWeekly.com

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

  • Controlling laptop and smartphone access to corporate networks

    Sponsored by: Dell Software

    Mobile devices are conduits of greater access and information flow, but can serve as a vehicle for malware and other security threats. Companies that rely on RDP solutions are more susceptible, because they may only support weak encryption standards. Find out how your IT department can scan all traffic to ensure network integrity and security.

  • File Sync and Share: Risks, Rewards, Considerations, and Deployment Options

    Sponsored by: Dropbox for Business

    This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.

  • New Virtual Networking Technologies Make Convergence Real

    Sponsored by: Dell, Inc. and Intel®

    This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.

  • BYOD: Bring Your Own Device – or Bring Your Own Danger?

    Sponsored by: WatchGuard Technologies, Inc.

    This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • Intelligent Authentication and User Access Balancing Security and Convenience

    Sponsored by: CA Technologies.

    Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.

  • The Great Multi Protocol Label Switching (MPLS) Migration

    Sponsored by: SingTel

    This exclusive resource explains the differences between MPLS and IPSec, detailing the benefits and drawbacks to each, as well as the overall benefits that can be achieved by migrating to MPLS.

  • The Business Platform Choice: Delivering IT - Business Integration with IPVPN

    Sponsored by: SingTel

    This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.

  • Network Evolution April 2013

    Sponsored by: SearchNetworking.com

    This month's issue Network Evolution takes a hardcore look at the hybrid cloud horizon to explore the future possibility of networking across disparate clouds.

  • Five Challenges in Private Cloud Networking

    Sponsored by: HP & Intel®

    This E-Guide from SearchNetworking.com unveils the top five challenges of private cloud networking and explores the ways to best overcome them. View now to learn more about address mapping, application acceleration, load balancing, and more!

  • Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD

    Sponsored by: Symantec Corporation

    BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  • Proper use of VPN and RPC/HTTPS

    Sponsored by: F5 Networks

    Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.

  • Mitigating Risk in a Mobile World

    Sponsored by: Symantec Corporation

    Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.

Browse by Report Type: VPN White Papers | VPN Multimedia | VPN IT Downloads

See more topics related to: VPN

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

SearchSecurity.co.UK Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.