Post of category Posts

Posts · Rethink Remote Access

Combating Data Breaches with Provisioning

According to a recent Gartner survey, enterprise security end-users stated that remote access and user provisioning are two of the top 10 security technology priorities for 2010.  With 2010 well under...

Posts · Rethink Remote Access

Will you be at RSA next week?

Can’t believe the RSA Conference is just a week away!  As you may already know, NCP will be exhibiting at the show again this year, and we’ve been quite busy preparing for it.  This year we are...

64-Bit · Posts

Options for 64-bit Windows 7 VPN

Big news today from Cisco as reported by Network World:

Posts · Rethink Remote Access

Remote Access without User Obstacles

There’s a great podcast featuring a friend of NCP engineering, Lisa Phifer, vice president of Core Competence, that outlines a few good steps network administrators can take to help protect the...

Endpoint Management · Posts

Pat the Device Down

Read an interesting article on InfoWorld earlier this week about the iPhone falsely reporting VPN policies and encryption support.  While the iPhone has been updated and fixed, miscommunication with...

64-Bit · Posts · Windows 7


NCP has recently been selected to provide end-point security solutions for Texas-based YES Prep Public Schools.  The school’s IT manager needed a secure VPN solution that would not only allow staff...

Posts · Troubleshoot

Lost Connections? Overlapping Subnets may be your culprit

Having trouble connecting to the network when you are on the road?  Don’t worry, you are not alone.  When traveling, many users report issues to their network administrators stating they cannot access...

Posts · Rethink Remote Access

Safety on the Open Web

We recently highlighted an interesting article, Online Traveler: Safe Surfing While on the Road by Fritz Faerber. He shares some security tips for surfing the Internet while on vacation. I wanted to...

2 Factor Authentication · Posts

Two-Factor Authentication

Secure remote access on an enterprise scale often means supporting two-factor authentication (2F), meaning identifying both the device and the person. With NCP engineering’s VPN client, enterprises...

Posts · Rethink Remote Access

Notes from the Road: VPN in Action (Day 4)

Greetings from Spokane, WA.  After completing an introductory training session in CA, René and Jens traveled north to WA, to give another VAR partner solution training and a NCP Secure Management...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.