Post of category Industry Commentary

Certificates · Industry Commentary · IPsec · Mobile · VPN

The Security Risks of Remote Support Tools

A recent study has come to light which shows that although remote support tools are being increasingly implemented within enterprises, IT decision-makers are uncertain about their safety. They should...

Industry Commentary · VPN

Vehicle VPNs, Part One: The ‘Connected Car’

The “connected car.” Up until this point, such a phrase never really resonated with people the way it does now. Most would think it referred to environmentally-focused electric cars that you recharge...

Industry Commentary · IT policy · VPN

Developing a Comprehensive Remote Access Security Framework: Identities and Roles

Every enterprise should consider implementing a comprehensive remote access security framework in light of increased workplace mobility and the BYOD trend. In our last post on the topic, we...

Industry Commentary · IT policy · VPN

Adobe Hacked: The Frightening Implications for Network Security

It seems barely more than a few weeks can pass without news of a major global company being targeted by cyber criminals. The latest to find a bullseye on its back is Adobe. The software company —...

Certificates · Endpoint Management · Industry Commentary · VPN

Why Elliptic Curve Cryptography is Necessary for Secure Remote Access

Recently, there have been many advances in cracking encryption algorithms that are the basis for the most common cryptography systems, such as Diffie-Hellman, RSA and DSA. Experts warn that within the...

2 Factor Authentication · Endpoint Management · Industry Commentary · Shows

Black Hat 2013: Key Takeaways on Remote Access Security

With the books closed on what was quite possibly the most controversial Black Hat conference ever, let’s take a few minutes to reflect on all of the hot button issues relating to remote access that...

Industry Commentary · VPN

Five BYOD Pitfalls and How to Avoid Them

Staying abreast of mobile trends and developments is one of the most important parts of being a remote access VPN solution provider. As our devoted followers know, we’ve regularly followed and offered...

Industry Commentary · IPsec · Rethink Remote Access · VPN

NCP engineering Examines VPNs and Network Security with TMCnet

When it comes to network security, IT administrators often miss the forest for the trees. Far too often, they focus on specific silos rather than how each component connects holistically, as Rainer...

Industry Commentary · IT policy · Mobile · SSL · Uncategorized · VPN

eWeek Explains How NCP’s VPN Client Supports Android BYOD Security

Enterprises know they’ll have happier employees if they embrace BYOD rather than prohibit it. Welcoming BYOD can be better for business output, too—the trick is to find the tools that keep employees...

Industry Commentary · Rethink Remote Access

What Windows XP’s End of Support Means for Security

This past summer, there was a lot of discussion around the advent of Windows 8, but one topic that was seemingly lost among all of the reviews of the latest operating system (OS) was the encroaching...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK