IP Security Virtual Private Networks White Papers

(View All Report Types)
IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

Find the UC Solution that Fits your Budget
sponsored by North Sydney IT and Cisco
WHITE PAPER: This informative paper examines some of the top UC solutions on the market and compares their TCO so you can see which tool will both satisfy your requirements and fit your budget.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

North Sydney IT and Cisco

Impact of Cloud on IT Consumption Models: Top 10 Insights
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper reviews the conclusions from a survey of IT leaders around the world.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Cisco Systems, Inc.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

The Business Platform Choice: Delivering IT - Business Integration with IPVPN
sponsored by Singtel
WHITE PAPER: This exclusive paper examines how leveraging IP VPN technology to seamlessly integrate ICT services into the execution of business strategies can drive innovation and increase efficiency.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Singtel

Tips for Choosing a Cloud Service Provider
sponsored by IBM
WHITE PAPER: This white paper shares tips on finding a cloud provider whose portfolio is as flexible and varied as the workloads it services.
Posted: 05 Aug 2012 | Published: 29 Jul 2012

IBM

Getting Mobile Collaboration Right
sponsored by Avaya
WHITE PAPER: This valuable guide offers information and advice to help you prepare and build an intelligent mobile collaboration strategy.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Avaya

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Enterprise