TITLE

Encryption key to VPN boost

AUTHOR(S)
Lawson, Stephen
PUB. DATE
April 1999
SOURCE
InfoWorld;04/12/99, Vol. 21 Issue 15, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Predicts an increase in virtual private network (VPN) capabilities in the year 2000 due to encryption coprocessors from hardware manufacturing firms Chrysalis-ITS and Hi/fn Inc. Features of the coprocessors; Views of analysts on the router solution to VPN.
ACCESSION #
1764049

 

Related Articles

  • Off-the-shelf security creates virtual private networks. Kempainen, Stephen; Granville, Fran // EDN;08/17/98, Vol. 43 Issue 17, p14 

    Focuses on the IPSECure software tool kits from Hi/fn, which increases the development of infrastructure products for virtual private networks. Functions of the kits; How the kits allocates the implementation of the Internat Protocol security (IPSEC) standard; Features of the kits; Information...

  • PROCESSOR RUNS AT WIRE SPEED. Cravotta, Nicholas // EDN;05/25/2000, Vol. 45 Issue 11, p26 

    Reports on the availability of the Luna 340 cryptographic accelerator from Chrysalis-ITS Inc. Product applications; Support of different encryption algorithms and protocols; Product price; Contact information.

  • RedCreek Eyes Desktop VPNs. O'Regan, Rob // PC Week;12/14/98, Vol. 15 Issue 50, p30 

    Introduces Ravlin, an encryption hardware for virtual private networks (VPN) developed by RedCreek Communication Inc. Features of Ravlin; Revenue projections for worldwide VPN hardware and software.

  • Hi/fn joins encryption, compression technology. Quinlan, Tom // InfoWorld;09/09/96, Vol. 18 Issue 37, p61 

    Reports that Hi/fn Inc. is adding support for industry standard encryption algorithms to compression technology. Software and hardware products that will be offered; Contact information.

  • SPIRAL SECURITY MODEL TO COUNTER THE THREATS DUE TO HUMAN FACTORS IN WEB APPLICATIONS. TRIPATHY, BISWAJIT; MISHRA, JIBITESH // International Journal of Research in Computer Application & Mana;Nov2013, Vol. 3 Issue 11, p36 

    Last few years, the security of web has taken a different turn. More and more attacks are done on applications. Also the severe lack of employee awareness is making security breaches particularly due to their weak operational practices. To make the task of the attackers easier, many a times the...

  • IBM tones VPN service with encryption, DSL. Rendleman, John // PC Week;02/22/99, Vol. 16 Issue 8, p24 

    States that IBM Global Services has enhanced its virtual private network (VPN) services with new encryption capabilities, support for select pocket computers, RADIUS authentication and expanded high-speed digital subscriber line (DSL) technology. Pricing; Protocols supported by the encryption...

  • I Don't Want to Say I Told You So, But... Surkan, Michael // PC Week;11/30/98, Vol. 15 Issue 48, p125 

    Focuses on virtual private networks (VPN) in late 1998. The decision by Aventail to end its production of stand alone VPN systems and to focus on VPN administration; How progress in the development of the Internet Protocol (IP) Security encryption standard is affecting VPNs; The growth in the...

  • Symantec preps SMB gateways. Messmer, Ellen // Network World;3/29/2004, Vol. 21 Issue 13, p25 

    Symantec Corp. plans to ship three new gateway security appliances for use by small to midsize businesses as combined virtual private network/firewall, web filtering and intrusion-detection systems. The Symantec Gateway 300 series is less powerful than the company's high-end 5400 security...

  • Internet, Intranet and Extranet.  // Management Services;Jul97, Vol. 41 Issue 7, p32 

    It was the blurring of the distinction between Internet and Intranet that caused an analyst at Summit Strategies in Boston to coin the term Extranet for web sites that live outside an organization's firewall but cater to specific user communities. An Extranet, then, is an Intranet that links...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics