VPNs Reports

Collaboration solutions: Solutions for small and medium business
sponsored by IBM
RESOURCE CENTER: Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Case Study: Capita Group PLC
sponsored by Druva
CASE STUDY: Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Druva

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Minimise the Security Risks of Mobile Email Access
sponsored by Hewlett-Packard Enterprise
EGUIDE: This expert e-guide will teach you how to put airtight security measures on remote e-mail access.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Enterprise

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

TechTarget ComputerWeekly.com

Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Juniper Networks, Inc.

How to Accurately Detect and Correct Packet Loss
sponsored by Silver Peak
WHITE PAPER: This paper explains how packet loss can be properly measured throughout an enterprise, and what can be done to mitigate its effects in real-time.
Posted: 21 May 2012 | Published: 31 Dec 2010

Silver Peak

Realizing Business Value in Managed File Transfer
sponsored by Globalscape
WHITE PAPER: Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

Globalscape