Beiträge aus der Kategorie: IT policy

2 Factor Authentication · Endpoint Management · IT policy · Rethink Remote Access · VPN

The Role of People-Centric Security Systems and Defense in Depth

Is it possible that IT administrators are actually doing too much to secure their corporate networks? Given the rate at which the enterprise security landscape changes, it almost seems like a...

IT policy · Mobile · Rethink Remote Access · SSL · VPN

PKI for Authenticating Remote Access VPNs: How Government Agencies Ensure Secure Communications

With many documents critical to matters of national security being accessed on a daily basis, government agencies must ensure that all users trying to establish connections of any type to their...

Endpoint Management · IT policy · Mobile · VPN

June Feature of the Month: Parameter Locks

Let’s face it – the vast majority of employees utilizing a remote access solution do not have a comprehensive understanding of how exactly it works. From end users’ perspectives, when the product is...

IPsec · IT policy · Mobile · SSL · VPN

NCP engineering Explores Trends in IPsec and SSL VPNs on insideHPC Slidecast

Initially created as a response to the difficulty of implementing earlier versions of IPsec VPNs, SSL VPNs have become increasingly common over the past few years. Because they were built to be easier...

Industry Commentary · IT policy · Mobile · SSL · Uncategorized · VPN

eWeek Explains How NCP’s VPN Client Supports Android BYOD Security

Enterprises know they’ll have happier employees if they embrace BYOD rather than prohibit it. Welcoming BYOD can be better for business output, too—the trick is to find the tools that keep employees...

IT policy · SSL · VPN

May Feature of the Month: SSL VPN & PortableLAN Client, Part Three

Over the past couple of weeks, we have explored the Web proxy feature of our SSL VPN technology, which isolates the internal Web server from direct access via the Internet. We have also discussed the...

IT policy · SSL · VPN

May Feature of the Month: SSL VPN, Part Two: Thin Client

Last week, we took a look at the web proxy feature of our SSL VPN technology as part of our Feature of the Month series. This week, we’ll be focusing on NCP’s thin client SSL, which provides companies...

Industry Commentary · IT policy · Rethink Remote Access · Shows · VPN

Mobile Endpoint Security Limitations a Hot Topic at Interop Las Vegas 2013

*Editor’s note: This blog originally appeared as a guest post on the Interop Blog

rainer
Expert Q&A · Highlights · IPsec · IT policy · Rethink Remote Access · SSL · virtualization · VPN

Expert Q&A: Establishing a Secure Data Center and Cloud with Remote Access

*Editor’s Note: This is Part One of an article that originally appeared in The Data Center Journal’s  Industry Perspective Column

Industry Commentary · IT policy · Mobile · VPN

VPNs and Common-Sense Policies Make BYOD Safer

By Patrick Oliver Graf, General Manager, NCP engineering

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK