WHITE PAPER:
The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
EZINE:
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.
PRESS RELEASE:
Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
EGUIDE:
Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
EGUIDE:
This e-guide discusses the ins and outs of MPLS VPNs and traditional virtual private networks. Uncover the differences, advantages and disadvantages of each one.
DATA SHEET:
Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
sponsored by Check Point Software Technologies Ltd.
CASE STUDY:
Encompass Medical Group found a turnkey HIPAA comliant Internet security solution by installing VPN-1 SmallOffice from Check Point Software.
CASE STUDY:
Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
WHITE PAPER:
This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.