Premium Content

Access "Remote access for the iPad generation: Managed vs. cloud VPN services"

John Burke, Principal Research Analyst, Nemertes Research Published: 28 Feb 2014

Whether they're trying to download project files at a client's office or access business applications while stuck at the airport, more and more employees need to make use of enterprise resources from wherever they happen to be working and on whatever device they are using -- be it a laptop, tablet or smartphone. The days of users being satisfied with just webmail access while on the go are long gone. John Burke Mobile platforms have steadily matured to provide the enhanced capabilities and flexibility that enable employees to work on a range of devices, prompting enterprises to develop or license mobile applications that take advantage of this power. As a result, employees are often trying to access corporate resources using public Wi-Fi hotspots or other networks that aren't inside the company's trusted zones.  For this evolving, distributed and virtual workforce, virtual private networks (VPNs) continue to be important features of the enterprise security landscape. A stable, easy-to-use VPN is a critical tool in the ongoing effort to make communications ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...