ipsec

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services
Published By: Singtel     Published Date: Oct 28, 2014
There are now a variety of alternatives when it comes to connecting multiple sites with WAN links. Multi Protocol Label Switching is fast gaining popularity for many businesses as their preferred choice when it comes to creating a Virtual Private Network (VPN) over WAN. This paper will discuss the differences between MPLS and IPSec, and the benefits achieved from migrating to MPLS.
Tags : 
singtel, vpn, wan, lan
    
Singtel
Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues
    
Tellabs
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption
    
Centrify Corporation
Published By: Safenet     Published Date: Oct 11, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec
    
Safenet
Published By: SafeNet     Published Date: Oct 06, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec
    
SafeNet
Published By: Mocana     Published Date: Jun 18, 2010
Learn how Mocana's NanoSec can speed your product development cycle while providing best-in-class device security for resource-constrained environments. Download the product whitepaper and receive a free trial.
Tags : 
mocana, nanosec, ipsec, embedded devices, product development cycle, device security
    
Mocana
Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade, upgrade vpn, analyst report, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec, ipsec vpn, comparison, system requirements, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Technical Primer explains how SSL VPNs work, and includes an objective comparison of the distinguishing factors between IPSec and SSL VPN technologies. You'll learn why these two technologies, based on fundamentally different designs and methodologies, each serve specific use cases best.
Tags : 
ssl, vpn, ssl vpn, comparison table, comparison guide, comparison chart, ipsec, ipsec vpn, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access, remote access security, employee productivity, productivity, cost control, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail
    
Aventail
Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard, ipsec, ntp, openssh, radius, samba
    
Stratus Technologies
Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall, vpn, unauthorized access, spam and phishing, real-time protection, threat-protected vpn, safe remote access, antivirus, anti-spyware, anti-spam, anti-phishing
    
Cisco
Published By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : 
ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec, ssl, central management, remote access, network security, next generation, authentication
    
NCP Engineering GmbH
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: IBM     Published Date: Nov 06, 2006
Many forward-thinking organizations are beginning to see the true potential of the convergence of voice, video and data.  It has the power to transform business relationships, business processes and collaboration between employees, suppliers and customers.
Tags : 
convergence, network convergence, ip telephony, voip, communications convergence, infrastructure, ip networks, ipsec, collaboration, ip faxing, voice over ip, ibm
    
IBM
Search      

Add Research

Get your company's research in the hands of targeted business professionals.