Posts tagged with IT security

Industry Commentary · IT policy · Mobile · SSL · virtualization · VPN

VPNs Enable Desktop Virtualization

By Bernd Reder

Expert Q&A · IT policy · Mobile

Executive Q&A On Data Security

Today, Rainer Enders, VPN expert and CTO of Americas at NCP engineering, addresses how IT and data management executives can properly protect their corporate data.

Highlights

What We're Reading, Week of 11/19

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain VulnerabilitiesMidsize Insider  – IT Security Threats: The Predictive Problem SearchCloudApplications – Mobile cloud trends:...

Highlights

What We're Reading, Week of 11/19

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain VulnerabilitiesMidsize Insider  – IT Security Threats: The Predictive Problem SearchCloudApplications – Mobile cloud trends:...

Highlights

What We're Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices

Highlights

What We're Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices

Golden Bridge Gold Winner
Awards · IPsec · Rethink Remote Access · VPN

NCP engineering Wins Gold at the 2012 Golden Bridge Awards!

Great news! NCP engineering is proud to announce that is has taken first place in the VPN/IPsec/SSL Innovations category at the fourth annual 2012 Golden Bridge Awards!

BYOD
Mobile · Rethink Remote Access

BYOD Dominates Interop New York

Among many key takeaways from last week’s Interop NY conference, the top-of-mind concern for CIOs, security professionals and other IT stakeholders remains mitigating the security risks associated...

IT policy · Readers' Poll

Readers' Poll: Do the Risks Associated with BYOD Overshadow the Benefits?

In April, we asked about the personal devices that are most likely to be used for work. From that poll, we learned that one-third of our readers are well-immersed in the BYOD movement and use two or...

IT policy · Readers' Poll

Readers' Poll: Do the Risks Associated with BYOD Overshadow the Benefits?

In April, we asked about the personal devices that are most likely to be used for work. From that poll, we learned that one-third of our readers are well-immersed in the BYOD movement and use two or...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK