Vendor VPN UnixWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Vendor VPN Unix returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Operating Systems and Subsystems
 •   Enterprise Systems Management
 •   VPN, Extranet and Intranet Solutions
 •   Network Security
 •   Database Migration and Conversion/ EDT
 •   Open Source
 •   Virtualization
 •   SSL VPN
 •   Database Administration

Related Searches
 •   Computing Vendor
 •   Corporation Vendor
 •   Designing Vendor
 •   Integration Vendor VPN Unix
 •   Research About Vendor VPN
 •   Small Vendor
 •   Vendor Sheets
 •   Vendor VPN Consulting
 •   Vendor VPN Unix Database
 •   Vendor VPN Unix Resources
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs by IBM

September 21, 2009 - (Free Research)
IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on. 
(WHITE PAPER) READ ABSTRACT |

SSL VPN for Secure Wireless LAN Access by F5 Networks

October 2007 - (Free Research)
For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell... 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: New economies of Unix mission critical computing by HP & Intel®

April 2011 - (Free Research)
In this presentation transcript learn why moving to Unix can help address concerns of uptime, flexibility and improved service levels when managing mission critical systems. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

With Enhanced POWER7 Systems, IBM Raises the Ceiling, Again by IBM

May 2011 - (Free Research)
This white paper identifies the three major players in the UNIX landscape and points out the strengths and limitations of each. 
(WHITE PAPER) READ ABSTRACT |

Making the Right Move to a Managed Service Provider for SSL VPN by MegaPath Inc.

March 2010 - (Free Research)
Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity. 
(WHITE PAPER) READ ABSTRACT |

Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM) by Juniper Networks, Inc.

September 2008 - (Free Research)
Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships. 
(WHITE PAPER) READ ABSTRACT |

Clean VPN Approach to Secure Remote Access by SonicWALL

June 2008 - (Free Research)
In this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security. 
(WHITE PAPER) READ ABSTRACT |

HRG Assessment - Linux Migration by Red Hat & IBM

November 2010 - (Free Research)
The migration from proprietary UNIX and legacy hardware and software-based environments to Linux on x86 Intel architecture (IA) is an effective way to take cost and complexity out of IT. 
(WHITE PAPER) READ ABSTRACT |

The Ultimate Triple Play: Migrating From a Proprietary RISC/Unix Platform to a Red Hat, Dell, Intel Solution by Red Hat and Dell Inc.

September 2009 - (Free Research)
There has never been a better time to migrate your proprietary RISC servers to Intel® Xeon® processor-powered Dell™ PowerEdge™ servers running Red Hat Enterprise Linux. This brief discusses how you can reduce costs and scalability, flexibility and performance with this trio of leading technology vendors supporting your business. 
(IT BRIEFING) READ ABSTRACT |

UNIX to Linux Migration Assessment by Red Hat

December 2010 - (Free Research)
Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures. 
(RESOURCE) READ ABSTRACT |

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

Sybase Analytic Appliance on IBM Power Systems by Sybase, an SAP company

July 2009 - (Free Research)
The Sybase Analytic Appliance is revolutionizing the data warehouse appliance market by integrating the leading column-based analytic software with hardware from the industry's number one provider of UNIX systems. Read this paper for more. 
(WHITE PAPER) READ ABSTRACT |

Pitney Bowes Case Study by Virtela Communications, Inc.

March 2008 - (Free Research)
When Pitney Bowes needed to extend the company's internal enterprise applications to its offices overseas, it required a solution for connecting securely to the corporate IT network. 
(CASE STUDY) READ ABSTRACT |

IBM DB2 9.7: Run Oracle applications on DB2 9.7 for Linux, UNIX, and Windows by IBM

August 2011 - (Free Research)
Leverage the IBM DB2 product’s out-of-the-box support for SQL and PL/SQL to enable many Oracle applications to execute against DB2 software virtually unchanged. Get an overview of its PL/SQL compatibility features. Whether you want to switch to DB2 or extend your DBMS vendor support, now is your time. 
(RESOURCE CENTER) READ ABSTRACT |

ISVs, "This One's for You" by AppZero

March 2009 - (Free Research)
Virtual machines and virtual appliances have successfully transformed data center operations. AppZero Virtual Application Appliances extend that transformation to server applications- Linux, Unix, and Windows. This paper explains Instant POCs, simplified implementations, and a cloud friendly slide to the SaaS model. 
(WHITE PAPER) READ ABSTRACT |

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 2012 - (Free Research)
Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution. 
(ANALYST REPORT) READ ABSTRACT |

Vyatta System Quick Start Guide by Vyatta Inc.

February 2009 - (Free Research)
Vyatta delivers the features, performance, and reliability of an enterprise-class secure router with the added benefits of flexible deployment options, freedom to integrate applications, and the economic advantages of commodity hardware and components. Read this manual to learn more about the Vyatta system and how easy it is to try it out. 
(ARTICLE) READ ABSTRACT |

Wireless LAN ITDC - Checklist #2 by SearchSecurity.com

October 2012 - (Free Research)
Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

With Enhanced POWER7 Systems, IBM Raises the Ceiling, Again by IBM

March 2012 - (Free Research)
This white paper outlines the current marketplace for UNIX systems on specialized architectures, outlining the challenges faced by CIOs who need a reliable vendor for their mission-critical data center. It examines the features and strengths of IBM's AIX on POWER7. 
(WHITE PAPER) READ ABSTRACT |

IBM DB2 E-Kit for Database Professionals by IBM

June 2010 - (Free Research)
If you're a DBA or database developer working with Oracle or another relational database management system, learn how easy it is to get trained and certified for IBM DB2 for Linux, UNIX, and Windows. Expand your skills portfolio, or extend your DBMS vendor support to include DB2.  Download this e-kit and learn more! 
(INFORMATION CENTER) READ ABSTRACT |

IT Decision Checklist: Remote Access by VirtualArmor

March 2010 - (Free Research)
The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

What Oracle Solaris Brings to Oracle Exalogic Elastic Cloud by Oracle Corporation

December 2011 - (Free Research)
<p>This white paper presents a system, designed to revolutionize data center consolidation, enabling enterprises to bring together disparate, mission-critical workloads with maximum reliability and security. Learn how this system, consisting of software, firmware and hardware, can reduce application implementation costs and more.</p> 
(WHITE PAPER) READ ABSTRACT |

How Service Providers Can Offer Premium Services and Increase Revenue by Effectively Managing VPNs by Hewlett-Packard Company

December 2007 - (Free Research)
Read this white paper to learn how to effectively manage these large scale networks to ensure that customers are receiving the level of service for which they have contracted. 
(WHITE PAPER) READ ABSTRACT |

Expert Strategies for Making a Unix-to-Linux Business Case by SearchDataCenter.com

October 2012 - (Free Research)
Access this expert e-guide and discover how to make the business case for your Unix-to-Linux migration. Learn how to clearly outline Unix limitations and what benefits will be achieved with Linux. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services by Dell, Inc. and Intel®

January 2010 - (Free Research)
In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts