vpn access

Results 1 - 25 of 53Sort Results By: Published Date | Title | Company Name
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago—through VPNs, proxies, and remote desktops—but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model.
Tags : 
enterprise, remote access, vpn, proxies, model
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Feb 23, 2017
BitSight relied on a key piece of software for business. As the number of software users grew, the complexity of deploying, managing, and maintaining a VPN infrastructure became a big, ongoing headache for IT. Read the case study to see how Akamai helped BitSight solve their access issues.
Tags : 
bitsight, software, vpn, infrastructure, access, remote
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Companies are increasingly using outside contractors and suppliers stay competitive, which means granting third-parties access to applications via VPN or VDI. This reliance causes increased complexity and burden on the Enterprise team while also creating additional security risk, as third-party access creates additional points of entry to an organization’s network. Read this solution brief to learn about a new painless, secure approach to remote access.
Tags : 
painless, security, third-party, resources, enterprise, vpn, solution
    
Akamai Technologies
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security, it management, wireless
    
PulseSecure
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, security management, security policies
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.
Tags : 
ssl vpn, virtual private networks, magic quadrant, remote access, virtualization, cloud computing
    
F5 Networks Inc
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago – through VPNs, proxies, and remote desktops. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
How are R&E network operators rethinking networks to accelerate scientific discovery? Discover the answer in this Ciena white paper today.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
How are R&E network operators rethinking networks to accelerate scientific discovery? Discover the answer in this Ciena white paper today.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Start   Previous   1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.