SSL Virtual Private Networks Reports

How SSL and TLS Secure Network Transactions
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Symantec & Blue Coat Systems

Potomac Hospital Case Study
sponsored by SonicWALL
CASE STUDY: In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
Posted: 15 Nov 2007 | Published: 01 Jun 2007

SonicWALL

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.

The Evolving Threat Landscape
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

E-Guide: Best Practices to ensure secure mobile communication
sponsored by TechTarget Security
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix