Results for the tag,

 

VPN

VPN: Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. (Source: Webopedia)

Managing 21st Century Networks - A World of Convergence


Section: Research
The Internet Protocol (IP) - used for transmitting data across networks everywhere - has moved beyond its origins. Once one of many, it has become a near standard for all types of computer communication. It is used pervasively, transmitting data to and from a multitude of devices ranging from those in our pockets to spacecraft circling distant planets. Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increa ...   read more

The Essential Elements of Secure Remote Access… Without the Management Headaches


Section: Research
Virtual private networks (VPNs) are the technologies most widely used by organisations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. A new generation of IPSec VPNs, which can enable organisations to gain a centrally managed and high security ...   read more

Alternatives to BT leased lines


Section: Articles
A leased line is defined as a dedicated high-performance circuit leased by a common carrier between a customer and a service provider’s network. It is rented on an annual basis and usually carries voice and data or both. It can be used for internet access or for a private connection between two customer sites. Compared to other internet connectivity options such as DSL products, leased lines are relatively expensive but are supported by a ...   read more

Considerations for Site to Site VPNs


Section: Articles
  A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organisation's network. The intention of the VPN is to offer the same kind of connectivity options that users receive from leased lines but at lower costs.   ...   read more

MPLS IP VPN explained


Section: Articles
MPLS is a highly scalable, protocol agnostic, data-carrying mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next. It belongs to the family of packet-switched networks and here data is transferred in the form of ‘Packets’ and the data packets are assigned a label and the content of the label alone influences packet forwarding decisions and there is no need to ex ...   read more

Private clouds without the capex - Housing your private cloud within a public cloud


Section: Articles
It should come as no surprise that it is possible to have a private cloud within a public cloud infrastructure, in much the same way as we have virtual private networks (VPNs) over the public Internet. The most common unschooled view of the cloud is unfortunately one of confusion, with the belief that it is an amorphous collection of compute resources at an indistinct group of third party sites. That definition more closely resembles the Internet itself, however.  Before addressing p ...   read more

First VPN solution launched for Android smartphones


Section: News
AuthenTec has launched the first smartphone security and identity management solution that combines fingerprint recognition with virtual private network (VPN) technology. The firm claims its QuickSec Mobile VPN Client 2.0 is faster and more reliable than the native Android VPN solution. Placeholder0The security solution works with the latest incarnation of the Android operating system and supports all the major VPN gateways. It incorporates some of the latest security features ...   read more

Juniper Networks offers SSL VPN to Android users


Section: News
Juniper Networks has adapted its SSL VPN software for use with the Android operating system (OS), bolstering security for Samsung smartphone and tablet users. The firm has ported its VPN solution to three Samsung Electronics devices - the Galaxy Tab 10.1, the Galaxy Note and the Galaxy SII. Placeholder0Businesses that have adopted flexible working policies and regularly use read more

Kaspersky Lab scoops major security accolade at V3 awards


Section: News
Kaspersky Lab has scooped the highly-acclaimed Best Security Provider award in the Business Software category at the V3.co.uk Technology Awards 2011. The firm said that the reason it won the accolade was because of its dedication to tackling security threats such as malware and hacktivism. Placeholde ...   read more

LulzSec hacker could be tracked over VPN


Section: News
A second LulzSec hacker could be arrested if they are traced using a British virtual private network (VPN) proxy service. The decision to pursue the hacker known as Neuron, would follow hot on the heels of a similar arrest made last week. Placeholder0Following the detainment of Cody Krestinger by the Federal Bureau of Investigation (FBI) last week, the hacking community expressed its outrage at the use of VPNs to track alleged miscreants. In the case of Mr Krestinger, the FBI f ...   read more

New security portal for VPN devices launched


Section: News
A new platform aimed at boosting the security of virtual private network (VPN) resources and cloud networks has been launched by SecureAuth. Bosses at the firm have suggested the SecureAuth IEP 6.2 boosts the protection of professional networks when being accessed by devices such as smartphones. Placeholder0Co-founder and chief technology officer at the company Garret Grajek believes t ...   read more

Prudent security provisions 'can protect SaaS users'


Section: News
Businesses planning to utilise software-as-a-service (SaaS) should ensure they set up strong security systems to protect their data, according to a former Hewlett Packard IT services engineer. Placeholder0Writing for Information Week, Kurt Marko warned that firms running their enterprise on the internet are vulnerable to cyber-crime such as cross-site scripting attacks and identity theft. However, he observed that there are steps firms can take to minimise the chance that they wil ...   read more

US Developer Outsourced to China


Section: News
A software developer working for a US company which is described as being a "critical infrastructure” company has been found to be outsourcing all of his programming work to China, whilst he spent his days surfing the web. Telecommunications provider Verizon were called in to investigate, following the discovery that the company’s VPN was being accessed via Shenyang, China. The VPN had been set up previously so that workers could telecommute and used 2-factor authentication. < ...   read more

1