Protecting virtual worlds of data in motion
Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...
SSL: Still Secure When Configured Correctly
The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...
Cloud Security Pitfalls to Avoid
Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....
A Look at BYOD in 2016
Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad...
A Closer Look at Cloud VPNs
Virtual Private Networks as a Service (VPNaaS), Managed Security Service Providers (MSSP) and Cloud Remote Access are different solutions addressing the same market requirement – the ability for...
Expert Q&A: Establishing a Secure Data Center and Cloud with Remote Access
*Editor’s Note: This is Part One of an article that originally appeared in The Data Center Journal’s Industry Perspective Column
NCP engineering Provides Joe the CIO with the Ideal VPN Solution
You might remember Joe the CIO, the paper CIO who is searching for ways to provide secure and efficient remote access to his company. When we last saw Joe, he was tackling remote access issues related...
Cloud computing without VPN is security risk, Part 2
By Bernd Reder
Cloud computing without VPN is a security risk
By Bernd Reder
Readers' Poll - Remote Access VPN and IT Security Strategy