X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 vpn


VPNs Are Hot, but What Are They?
The Virtual Private Network (VPN) market is exploding. There are many different ideas on what a VPN is, and how to implement them. This article clarifies what

vpn  opening the door for VPN opportunities. Unquestionably, VPNs are hot. But what are they? Most experts will agree that the acronym stands for Virtual Private Network , however, what a VPN is depends on whom you ask. According to Eric Wolford, Director of IP marketing for AT&T Internet services VPNs tend to now be what the market says they are. The best way to find out what a provider means when they talk about VPNs is to review its VPN Service Level Description . If a VPN provider does not have a

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Firewall RFI/RFP Template

Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more 

Evaluate Now

Documents related to » vpn

IPSec VPNs for Extranets: Not what you want to wake up next to


In general VPNs are ill suited to building multi-company extranets, for any situation that extends across organizational boundaries, or where there is unbalanced trust between end points. This article discusses the basic requirements for a true extranet solution.

vpn  Integration, March 2000 The VPN Paradox For the past several years, vendors have touted VPNs as the natural solution for leveraging the lower cost Internet medium to support intranets, remote access, e-commerce, and extranets. While VPNs have made significant progress in replacing dial and leased lines for RAS and intranet connections, they have fallen short when it comes to Extranets. In general VPNs are ill suited to building multi-company extranets (1) or any situation that extends across Read More

Emerging Services for Wireless Carrier Networks--Design Abstract


The transition to IP A wireless carrier s national or regional next generation core network will be an all-IP network in the sense that IP will be the network layer (L3) protocol. MPLS (Multiprotocol Label Switching) will be the transport protocol for all IP-based services, applications, and control and management traffic in the network. Learn more in this white paper.

vpn  closed user group(s). A VPN simulates the operation of a private wide area network (WAN) over a common infrastructure. MPLS allows the creation of Layer 3 VPNs across an MPLS infrastructure, providing a simple, flexible, and powerful tunneling mechanism. These tunnels provide transport service and enable the use of: Segregation of traffic such as voice and VoIP, signaling traffic, public/customer data services, as well as private data services such as billing and provisioning, and Corporate IT traffic Read More

Netscreen ISG 2000


Juniper Networks provides integrated firewall/IPSec VPN security appliances that administrators use to protect networks with a layered security approach. The breadth of performance (50Mbps to 12Gbps) and interface options (up to 78 physical interfaces) enables administrators to protect communications and resources at the perimeter, in the infrastructure and out to remote sites and users. Every appliance is designed for integration of hardware and software processing--using a high-speed multi-bus architecture that couples ASIC-based processing with a dedicated security-specific operating system. A controlling element in the company's devices is the operating system, NetScreen ScreenOS, which is a real time, security-specific operating system. ScreenOS includes the following set of security and management applications. - Common criteria and ICSA certified stateful inspection firewall for network protection - ICSA certified IPSec VPN gateway for interoperable, secure communications - Deep inspection for application-level attack protection - Virtualization capabilities for network segmentation - High availability to ensure maximum network reliability - Management interfaces, both internal and external to facilitate deployment  

vpn  Networks provides integrated firewall/IPSec VPN security appliances that administrators use to protect networks with a layered security approach. The breadth of performance (50Mbps to 12Gbps) and interface options (up to 78 physical interfaces) enables administrators to protect communications and resources at the perimeter, in the infrastructure and out to remote sites and users. Every appliance is designed for integration of hardware and software processing--using a high-speed multi-bus architecture Read More

Information Security RFI/RFP Template


Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module

vpn  System Virtual Private Network (VPN) Public Key Infrastructure (PKI) Enterprise Applications Cryptographic Module This functional and technical requirement set template covers industry-standard functional criteria of Information Security Selection that can help you easily gather and prioritize your business needs in a simple and categorized excel document. More than a RFP template, it is a working document that serves as a knowledge base reference throughout the life-span of your Information Security Read More

TEC Joins Forces with SIRIUS Services Conseils to Help Clients Reduce Risk When Choosing Enterprise Software


SIRIUS Services Conseils and Technology Evaluation Centers (TEC) announce the launch of a new alliance designed to assist companies with comparing, evaluating, and selecting enterprise software.

vpn  Joins Forces with SIRIUS Services Conseils to Help Clients Reduce Risk When Choosing Enterprise Software TEC Joins Forces with SIRIUS Services Conseils to Help Clients Reduce Risk When Choosing Enterprise Software Montreal, May 8, 2006 SIRIUS Services Conseils and Technology Evaluation Centers (TEC) announce the launch of a new alliance designed to assist companies with comparing, evaluating, and selecting enterprise software. Montreal, May 8, 2006 -SIRIUS Conseils ( Read More

Are ERP Software Vendors Messing with Your Head? (The Fine Art of Interpreting White Papers)


(Scroll down for my list of Top 10 ERP White Paper Buzzwords!) I first published a version of this post a few years ago. Sad to say, not much has changed since then… Imagine that you're at the research stage of an enterprise resource planning (ERP) selection process. You're looking to get a handle on the scope of the project, and an idea of potential solutions and approaches

vpn  ERP Software Vendors Messing with Your Head? (The Fine Art of Interpreting White Papers) (Scroll down for my list of Top 10 ERP White Paper Buzzwords !) I first published a version of this post a few years ago. Sad to say, not much has changed since then… Imagine that you're at the research stage of an enterprise resource planning (ERP) selection process. You're looking to get a handle on the scope of the project, and an idea of potential solutions and approaches. Or maybe you're at the shortlist Read More

What Makes a Good White Paper Good… (part two)


And here's the second point that all writers of IT white papers should keep in mind when writing (special notice of this point should be taken by those writers who may *forget* that not everyone on the planet has the same rarified vocabulary, not mentioning the names of any jobs or fields...). 2. Audience, Audience (Stake a claim with your first paragraph). After the compelling title, the

vpn  Makes a Good White Paper Good… (part two) And here's the second point that all writers of IT white papers should keep in mind when writing (special notice of this point should be taken by those writers who may *forget* that not everyone on the planet has the same rarified vocabulary, not mentioning the names of any jobs or fields...). 2. Audience, Audience (Stake a claim with your first paragraph). After the compelling title, the first paragraph makes or breaks audience “ affinity, ” which is Ste Read More

Ask the Experts Question Raises Some Interest: What do you know about Segregation of Duties and SOX?


Every so often, Technology Evaluation Centers (TEC) analysts—our in-house panel of experts—receive questions from readers on a variety of software-related subjects. While mostly in the realm of software selection, evaluation, the latest technology offerings, or simply questions about business issues, on occasion we receive a request that piques our interest—especially when it is slightly outside

vpn  the Experts Question Raises Some Interest: What do you know about Segregation of Duties and SOX? Every so often, Technology Evaluation Centers (TEC) analysts—our in-house panel of experts—receive questions from readers on a variety of software-related subjects. While mostly in the realm of software selection, evaluation, the latest technology offerings, or simply questions about business issues, on occasion we receive a request that piques our interest—especially when it is slightly outside of Read More

What Makes a Good IT White Paper Good… and a Bad IT White Paper Very, Very Bad…


A white paper is a document or “brief” (and yes, perhaps unfortunately, I mean “brief” in the sense of something that informs rather than something that is short—white papers are sometimes as concise as newspaper editorials, or run as long as the latest “… For Dummies” book; examples of this will be provided in upcoming posts). A white paper’s purpose is to educate the reader, who is the potential

vpn  Makes a Good IT White Paper Good… and a Bad IT White Paper Very, Very Bad… A white paper is a document or “brief” (and yes, perhaps unfortunately, I mean “brief” in the sense of something that informs rather than something that is short —white papers are sometimes as concise as newspaper editorials, or run as long as the latest “… For Dummies” book; examples of this will be provided in upcoming posts). A white paper’s purpose is to educate the reader, who is the potential customer Read More

NIST Certification for AES Encryption


The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous testing process for software vendors. The AES certification process tests every aspect of encryption and involves millions of operations. Discover a solution that has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform.

vpn  Certification for AES Encryption The National Institute of Standards and Technology (NIST) defines the standard for AES encryption, and provides a rigorous testing process for software vendors. The certification process is carried out by independent testing labs who report the results to NIST for validation. The AES certification process tests every aspect of encryption and involves millions of encryption and decryption operations. Only the most dedicated security vendors are able to pass the tests Read More

How to Alienate Your Reader: Jargon, Buzzwords, Lingo, and Gobbledygook


This Is For All Us Writers Out There: Oh, and All Us Readers Too! Do you ever feel like you need a jargon buster just to understand what some companies are saying about their software products? I know I’ve needed one, and often still do. I am a content writer and editor for TEC and the learning curve was pretty steep when I started. I mean what is functionality, scalability, dynamic lead

vpn  to Alienate Your Reader: Jargon, Buzzwords, Lingo, and Gobbledygook This Is For All Us Writers Out There: Oh, and All Us Readers Too! Do you ever feel like you need a jargon buster just to understand what some companies are saying about their software products? I know I’ve needed one, and often still do. I am a content writer and editor for TEC and the learning curve was pretty steep when I started. I mean what is functionality, scalability, dynamic lead time, run time, and then there are features Read More

Tips for Researching Enterprise Solutions


Given the majority of participants in a selection committee are not enterprise software specialists, quality enterprise research on applications is crucial. Even if you are employing consultants (with their cute business attire and boxes of love they give during the holidays---my PM brother-in-law once scored a leather jacket, but I digress), it’s still important to be well versed about the

vpn  for Researching Enterprise Solutions Given the majority of participants in a selection committee are not enterprise software specialists, quality enterprise research on applications is crucial. Even if you are employing consultants (with their cute business attire and boxes of love they give during the holidays---my PM brother-in-law once scored a leather jacket, but I digress), it’s still important to be well versed about the solution sets you are considering. Having been an editor at TEC for over Read More

TEC Helps Corona, a Global Ceramics Leader, Simplify Its ERP Selection in Record Time


Corona, one of the largest conglomerates in South America, specializing in ceramic and tile products, recently engaged the services of Technology Evaluation Centers Inc. (TEC), the leading resource for enterprise software, to help evaluate its existing enterprise resource planning (ERP) systems against top solutions in the market. TEC's best-practices methodology and decision support system, eBestMatch™, enabled Corona to confidently select in record time a standardized ERP solution for all of its operations—without anyone having to leave the office.

vpn  Helps Corona, a Global Ceramics Leader, Simplify Its ERP Selection in Record Time TEC Helps Corona, a Global Ceramics Leader, Simplify Its ERP Selection in Record Time Corona solves problem of multiple ERPs through objective software evaluation and selection methodology Montreal, QC, July 14, 2009 - Corona, one of the largest conglomerates in South America, specializing in ceramic and tile products, recently engaged the services of Technology Evaluation Centers Inc. (TEC), the leading resource for Read More

ERP Vendor Shootout for Small and Midsize Manufacturing Companies Evaluating Enterprise Software Solutions


Technology Evaluation Centers Inc., the leading resource for enterprise software selection announced today that it will be moderating the second annual "ERP Vendor Shootout" on May 1, 2008, at the Charlotte Convention Center, Charlotte, NC (US). Value-added resellers will be available at the event to represent each vendor solution.

vpn  Vendor Shootout for Small and Midsize Manufacturing Companies Evaluating Enterprise Software Solutions ERP Vendor Shootout for Small and Midsize Manufacturing Companies Evaluating Enterprise Software Solutions Learn how SAP, Oracle, Microsoft, Infor, Epicor, and IFS compare - head to head! Montreal, Quebec, March 19, 2008- Technology Evaluation Centers Inc . ( TEC ), the leading resource for enterprise software selection announced today that it will be moderating the second annual ERP Vendor Shootout Read More