SSL Remote Access Reports

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Symantec Corporation

Potomac Hospital Case Study
sponsored by SonicWALL
CASE STUDY: In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
Posted: 15 Nov 2007 | Published: 01 Jun 2007

SonicWALL

How SSL and TLS Secure Network Transactions
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Symantec & Blue Coat Systems

7 Key Requirements for Remote Access
sponsored by Citrix
WHITE PAPER: Learn how to select the right application delivery infrastructure to provide secure remote access. Discover the 7 key requirements for remote access and the right questions to ask vendors during the selection process.
Posted: 11 Oct 2007 | Published: 01 Oct 2007

Citrix

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Making the Right Move to a Managed Service Provider for SSL VPN
sponsored by MegaPath Inc.
WHITE PAPER: Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.

Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER: SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL