Vehicle VPNs, Part Two: Business World Implications
In recent years, remote access security has become a major focus of IT departments in businesses small and large. The rapid growth in the use of smartphones and tablet computers, the...
What Windows XP’s End of Support Means for Security
This past summer, there was a lot of discussion around the advent of Windows 8, but one topic that was seemingly lost among all of the reviews of the latest operating system (OS) was the encroaching...
Expert Q&A: Establishing a Secure Data Center and Cloud with Remote Access
*Editor’s Note: This is Part One of an article that originally appeared in The Data Center Journal’s Industry Perspective Column
VPNs and Common-Sense Policies Make BYOD Safer
By Patrick Oliver Graf, General Manager, NCP engineering
VPNs Enable Desktop Virtualization
By Bernd Reder
February Feature of the Month: Integrated Support for 3G / LTE Cards, Part Two
This is Part Two of our February Feature of the Month series. Last week, we honored the all-new Access Point Name (APN) feature in NCP’s entry and enterprise IPsec VPN clients.
Q&A On SSL VPNs, Part Two: Joerg Hirschmann
This is part two in our Q&A series on SSL VPNs. Earlier this week, we shared insight from Rainer Enders, CTO, Americas at NCP engineering, on the inception of SSL VPN and its key differentiators.
Q&A on Employee Provisioning with Joerg Hirschmann: Part 3
This is the third and final entry in our Q&A series on questions related to employee provisioning and VPNs. Last week, we addressed how provisioning can benefit an organizations' overall security...
Secure Communications in Harsh Environments, Part 3
Editor’s Note: This is part three in a three-part series on remote access in harsh environments. Part one of series details the emergence of harsh environment threats, while part two covers the risks...