• Telecommuter security kit

    Telecommuters often feel isolated from their company, and security-wise that is the last thing you want. Contributor Jonathan Hassell provides a list of items -- from router configuration instructions to VPN alternatives -- to include in a telecommuter security kit to make sure they are working...

    JonHassell1,275 pointsBadges:
  • How do you approach global MPLS procurement?

    An expert discussed some of the particular challenges associated with the international procurement of MPLS VPN services.

    Robert Sturt205 pointsBadges:
  • virtual private network (VPN)

    A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A VPN ensures privacy through security procedures and tunneling protocols such as the Layer Two Tunneling...

    Margaret Rouse7,265 pointsBadges:
  • SSL VPN (Secure Sockets Layer virtual private network)

    An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser... (Continued)

    Margaret Rouse7,265 pointsBadges:
  • Does your company preconfigure VPN access? Have you had success with this?

    searchnetworking7,945 pointsBadges:
  • What’s the best way to safely preconfigure VPN access?

    Expert Julian Weinberger says limiting user VPN access can help enterprises enforce security and BYOD policies and reduce risk at the same time.

    searchnetworking7,945 pointsBadges:
  • How do you create a secure VPN tunnel?

    Expert Julian Weinberger says that locking your VPN parameters can help secure your VPN tunnel by blocking users from changing configurations.

    searchnetworking7,945 pointsBadges:
  • Mobile VPN: Closing the gap

    PDA VPN clients have been around for nearly as long as PDAs themselves. From the simple PPTP client found in early Windows HPCs to standard IPsec clients embedded in today's Symbian and Windows Mobile smartphones, solutions abound for tunneling from mobile devices to corporate VPNs. But finding a...

    LisaPhifer1,345 pointsBadges:
  • Would you consider connecting your mobile devices through your company’s VPN?

    Jake O'Donnell1,290 pointsBadges:
  • Pulse Secure puts VPN, MAM in harmony for mobile security

    Will IT bite at a new EMM option that combines secure VPN and MAM for mobile security?

    Jake O'Donnell1,290 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following