Networking Research Library

Powered by Bitpipe.com

VPN SoftwareResearch

  • Amazon Virtual Private Cloud Connectivity Options

    Sponsored by: Amazon Web Services

    This document describes and evaluates several common virtual network connectivity options, including integrating remote customer networks with Amazon VPC, as well as interconnecting multiple Amazon VPCs into a contiguous virtual network.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • Network Evolution – March 2014

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • The Business Platform Choice: Delivering IT - Business Integration with IPVPN

    Sponsored by: SingTel

    This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.

  • Next Generation Enterprise WAN Regional WAN Remote Access VPN overview

    Sponsored by: Cisco Systems, Inc.

    Read this paper to learn how deploying routed WAN solutions for borderless networks enables your business to support mobile workers and branch offices therefore contributing to increased productivity and performance across the enterprise.

  • Next Generation Enterprise WAN DMVPN

    Sponsored by: Cisco Systems, Inc.

    Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.

  • AT&T Virtual Tunneling Service

    Sponsored by: AT&T Corp

    AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

  • Vyatta System Quick Start Guide

    Sponsored by: Vyatta Inc.

    Vyatta delivers the features, performance, and reliability of an enterprise-class secure router with the added benefits of flexible deployment options, freedom to integrate applications, and the economic advantages of commodity hardware and components. Read this manual to learn more about the Vyatta system and how easy it is to try it out.

  • The Virtual Office Checklist

    Sponsored by: Cisco Systems, Inc.

    The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.

  • Securely Enabling VoIP Remote Users

    Sponsored by: Sipera Systems

    This white paper details the requirements for securely enabling VoIP remote users and why traditional data security products, such as IPSec VPNs, are not able to properly handle them.

  • DePaul University Case Study

    Sponsored by: SonicWALL

    In this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.

  • IPSEC VS. VPN: Transition Criteria and Methodology

    Sponsored by: SonicWALL

    This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.

  • 7 Key Requirements for Remote Access

    Sponsored by: Citrix

    Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.

  • SSL VPN Technical Primer

    Sponsored by: Aventail | SonicWall

    SSL VPNs provide remote users with easy-to-use, secure access to applications and resources on the network while minimizing associated risks and significantly lowering administration and support costs. Find out how your company can benefit.

  • Mobility XE Data Sheet.pdf

    Sponsored by: NetMotion Wireless

    This NetMotion Wireless datasheet profiles its award-winning Mobility XE, a Mobile VPN that provides mobile workers secure, remote access to network resources and applications over any IP-based network.

  • Managing Security on Mobile Phones

    Sponsored by: Nokia

    This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges.

Browse by Report Type: VPN Software White Papers | VPN Software Multimedia | VPN Software IT Downloads

See more topics related to: VPN Software

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Networking Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.