Posts tagged with Cloud

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

Online Data Security Concept
Data Security · Encryption · SSL

SSL: Still Secure When Configured Correctly

The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...

person-smartphone-office-table
Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

laptop computer
BYOD · VPN

A Look at BYOD in 2016

Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad...

Cloud · Encryption · Rethink Remote Access · virtualization · VPN

A Closer Look at Cloud VPNs

Virtual Private Networks as a Service (VPNaaS), Managed Security Service Providers (MSSP) and Cloud Remote Access are different solutions addressing the same market requirement – the ability for...

rainer
Expert Q&A · Highlights · IPsec · IT policy · Rethink Remote Access · SSL · virtualization · VPN

Expert Q&A: Establishing a Secure Data Center and Cloud with Remote Access

*Editor’s Note: This is Part One of an article that originally appeared in The Data Center Journal’s  Industry Perspective Column

Rethink Remote Access · Video · VPN

NCP engineering Provides Joe the CIO with the Ideal VPN Solution

You might remember Joe the CIO, the paper CIO who is searching for ways to provide secure and efficient remote access to his company. When we last saw Joe, he was tackling remote access issues related...

Cloud · IPsec · Rethink Remote Access · VPN

Cloud computing without VPN is security risk, Part 2

By Bernd Reder

Cloud · Rethink Remote Access · VPN

Cloud computing without VPN is a security risk

By Bernd Reder

Readers' Poll

Readers' Poll - Remote Access VPN and IT Security Strategy

[polldaddy poll=6022209]