Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "VPN"

Total Search Results : 172

Checkpoint's Mobile Access Blade: VPN For iPad And iPhone

October 25, 2010 09:44 AM
Check Point Software Technologies is entering the device access control market with their Mobile Access Software Blade. The new blade provides secure SSL VPN connectivity and certificate-based two-factor authentication to a mobile device-specific portal to email and other business applications -- CRM, Share Point, inventory tracking, purchasing systems, corporate intranet, etc. Mobile Access Software initially supports Apple's iPhone and iPad, and other device support is forth coming.

Cisco's High-Performance ASA Appliance, New Version Of Anyconnect

October 05, 2010 12:00 PM
Cisco Systems has announced its newest high-end ASA security appliance, stressing high-connection and concurrency rates as well as throughput to support high-performance, low-latency application environments. It has also announced enhancements to its Anyconnect remote VPN client. Cisco has a comprehensive vision of a borderless network, and today's announcements are driving it forward. That's good news if you're a Cisco shop, but the company still has more to do.

Needham Bank Cashes In On Remote Connectivity

September 07, 2010 08:31 AM
Executives at Needham Bank have been able to remotely log into and work in a variety of core banking applications for some time now. The bank has tripled the number of remote users in its ranks, many of whom use iPhones and iPads, but James Gordon, VP of IT at the customer-owned bank, which operates five branches throughout the greater Boston area, has never been happy with the solution.

When To Encrypt At Layer 2 Or Layer 3

August 31, 2010 09:24 AM
Layer 2--data link layer--encryption is a high-performance security option that offers some advantages over Layer 3--networking layer--encryption in some scenarios, particularly in unified communications environments that require low-latency, high-volume data transmission. The increased availability and popularity of high-speed carrier Ethernet services provide fast, relatively cheap transmission, particularly for voice, video and other latency sensitive traffic. Enterprises can leverage more traditional Layer 3 IPSec encryption utilizing high-speed switching technology and fast pipes. Or, they can look at Layer 2 encryption technology, which is faster and simple to manage, for appropriate situations.

What Do We Do Now That All Wireless Security Protocols Are Busted?

July 26, 2010 09:30 AM
Just like that, the last bastion of wireless security went in the toilet. By now, anyone in the wireless game has likely heard about the Hole 196 attack that renders WPA2--depending on your tolerance for the parameters of the exploit--useless. Sure, the Advanced Encryption Standard (AES) used in WPA2 is still sound enough to have the confidence of the US government for its beefiest encryption needs, but WPA2 itself now has a black eye. A big one.

Radio IP Announces New Release of Its ipUnplugged Mobile VPN Solution

July 16, 2010 10:02 AM
Radio IP Software, Inc., a leading developer of advanced mobile Virtual Private Network (VPN) solutions, announced today the new release of its ipUnplugged mobile VPN solution for business-critical communications. The new version adds several enhancements including support for PDA on Mobile Windows, FIPS 140-2 compliance, validated AES 256 encryption, and simplified user and license management. Leveraging these enhancements, ipUnplugged was thoroughly tested by Celestica, a global leader in the delivery of end-to-end product lifecycle solutions, and achieved Vendor Application Validation of a leading Canadian Service Provider for its laptop and PDA support capabilities. Furthermore, ipUnplugged also achieved Networthiness status from the Communication Electronic Command (CECOM) and is now included in the US Army's catalogue of authorized solutions.

F5 Enhances SSL VPN Offerings

June 22, 2010 10:01 AM
F5 Networks, Inc., the global leader in Application Delivery Networking (ADN), today announced a new version of its FirePass SSL VPN solution. With the 7.0 release, FirePass provides enhanced access capabilities, improved IT management through integrated access services with third-party solutions, and flexible deployment options, including an SSL VPN virtual appliance running on VMware vSphere, FirePass Virtual Edition (VE). FirePass provides browser-based access to organizations' applications, networks, and data, and employs customizable access policies to ensure all devices accessing corporate information adhere to a company's specific requirements.

Entrust Credentialing Services Offers New End-to-End, SAAS Approach For Identity-Based Smartcards

June 15, 2010 09:17 AM
Building on its heritage of providing identity-based security credentials for government, enterprise and border security initiatives, Entrust, Inc., is extending their public key infrastructure technology to provide a comprehensive multipurpose smartcard offering. The Entrust Credentialing Service is an end-to-end hosted solution for organizations to issue unified smartcard credentials -- tailored for enterprise, citizen or government environments -- to secure physical and logical access, virtual private networks (VPN) and other enterprise functions and capabilities.

WAN Encryption: Just Do It

June 02, 2010 07:00 AM
One my philosophy professors asked the question "Where is your car parked?" I told him where I parked it. He then asked me how I knew it remained where I left it. "Is it possible," he asked, "that a group of pranksters picked it up and moved it elsewhere?" I'd pulled that prank, so I knew it was possible. Then he asked, "What if one set of pranksters moved your car elsewhere, and then another set of pranksters moved back to the spot where you left it by coincidence? Would I know?" The exercise goes right to the heart of network security. What assurances do you have that what you expect to happen is actually happening? One of the ongoing issues with wide area networking is how secure is secure enough? Once the data leaves your network, you have no idea what happens to it. If it leaves unencrypted, you have no idea if anyone snooped on it.

Does Windows 7 Make VPNs Obsolete?

September 10, 2009 12:20 PM
The new one-two operating system ecosystem from Microsoft -- Windows 7 on the client side coupled with Windows Server 2008 R2 on the back end -- includes a feature, called DirectAccess, which automatically connects users to their enterprise network without having to go through a VPN client, effectively eliminating the need for users to fiddle with (or hide from ) virtual private network clients.

« Previous Page  | 1 |  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers