Internet Protocol Security VPN White Papers

(View All Report Types)
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER: This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Impact of Cloud on IT Consumption Models: Top 10 Insights
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper reviews the conclusions from a survey of IT leaders around the world.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Cisco Systems, Inc.

A TCO Comparison for Unified Communications and Collaboration
sponsored by Cisco
WHITE PAPER: This exclusive resource examines a feature-rich, scalable unified communications solution that can drive innovation and increase productivity. Read on to see how it compares to other leading unified communications solutions.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Cisco

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software

Evaluating the Total Costs of a Unified Communications Solution
sponsored by Cisco
WHITE PAPER: Discover the top recommendations for selecting a UC solution that fits the needs of your business. Learn how to weigh the most important factors and assess the TCO of your UC solution.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Cisco

How to Accurately Detect and Correct Packet Loss
sponsored by Silver Peak
WHITE PAPER: This paper explains how packet loss can be properly measured throughout an enterprise, and what can be done to mitigate its effects in real-time.
Posted: 21 May 2012 | Published: 31 Dec 2010

Silver Peak

Developing an effective resiliency capability within a cloud design
sponsored by IBM
WHITE PAPER: Read this white paper to learn how to develop a reliable resiliency management program for your cloud environment. Review the key elements, business areas and questions you should consider.
Posted: 27 Jun 2012 | Published: 31 Aug 2011

IBM

How to overcome roadblocks to legacy software replacement: a guide for IT leaders
sponsored by MSM Software
WHITE PAPER: This whitepaper gathers together the views of IT leaders from a recent survey of IT leaders and identifies the most typical roadblocks encountered when attempting to modernize legacy systems – as well as how they address those challenges.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

MSM Software