V P N Reports

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

VPLS: The Switched Ethernet
sponsored by AT&T Corp
WHITE PAPER: Virtual Private LAN Service is evolving into the next "in" technology. AT&T defines it as any-to-any Ethernet that can be either metro or long haul. VPLS allows enterprises to scale bandwidth and is a good fit for customers who require meshed connectivity and want to control and manage routing.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

The Evolving Threat Landscape
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Cisco PIX 506E Security Appliance
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-bu...
Posted: 10 Jul 2008 | Published: 01 Dec 2007

Cisco Systems, Inc.

5 Steps to Understanding Cloud Computing Networks
sponsored by Dell, Inc. and Intel®
EGUIDE: This guide discusses the two missions of cloud computing networks, as well as how to accomplish these goals. Also included are five requirements for successful cloud computing networks.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Dell, Inc. and Intel®

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation

File Sync and Share: Risks, Rewards, Considerations, and Deployment Options
sponsored by Dropbox for Business
EGUIDE: This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Dropbox for Business

The Definitive Guide to Telework
sponsored by Aerohive Networks
EBOOK: This e-book looks at teleworking from all angles, examining what’s driving and potentially hindering its adoption, the technical and cultural requirements to support teleworking, and the considerations enterprises should make to ensure they have what they need for an effective telework deployment in their workplace.
Posted: 01 Jun 2011 | Published: 31 May 2011

Aerohive Networks

Making the Right Move to a Managed Service Provider for SSL VPN
sponsored by MegaPath Inc.
WHITE PAPER: Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.