Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Five things you need to know about Android phones

    Android phones are in high demand by workers, but they lack key security features. Here are the top five things you can do to make sure Android phones in your organisation don't create a security nightmare.

  • Cisco Cius: A hands on preview

    Toss all preconceptions of the Cisco Cius out the door. This is not just another Android tablet. Instead, Cisco has taken great pains to position the Cius as a very different type of tablet. This is one device whose primary purpose lies less in competing head-to-head with the tablet masses, and more at changing how the enterprise does business.

  • The 5 coolest things to come out of CES

    Anyone who's attended tech conventions over the past five years has heard plenty about 4G wireless networks, but this year the hype has become a reality.

  • Cisco Cius versus Apple iPad

    The Cisco Cius tablet is more than an Apple iPad knock-off. Here's how the two stack up.

  • Smartbook: the ultimate evolution of the netbook?

    The netbook promises convenience and capability in a small, lightweight, and generally inexpensive package, and the concept of a smartbook goes even further: a handy dandy combination of smartphone and notebook.

  • Mac OS X Snow Leopard - bad for business?

    There's no doubt that Mac OS X 10.6, aka Snow Leopard, is a worthwhile upgrade - a no-brainer for people with Intel Macs. I've pointed out the 7 best features in Snow Leopard, and my three-part series of slideshows details the many enhancements in Snow Leopard for all users, for office users, and for power users. But Snow Leopard has a few flaws that should not go ignored in the enthusiasm for its many strengths. In fact, some of the more welcome additions to Snow Leopard also house some of the bigger disappointments. By not going far enough, Snow Leopard's support for Exchange 2007 and Cisco's VPN protocol are chief among them.

  • Nokia's enterprise expansion

    The Finnish handset supremo has built up a head of steam with its E series phones and its Intellisynch software. Where is it going to next?

  • The shifting sands of WAN optimisation

    Riverbed's announcement this week that it is shipping its PC client software has underlined the fact that PCs are now powerful enough to do the job of a WAN optimisation appliance.

  • Will 2008 be the year of the open-source desktop?

    When the open-source desktop becomes a more widely deployed end-user operating system, it becomes a product and not a project.

  • WAN acceleration comes to the PC

    WAN optimisation developers are bringing out Windows clients capable of accelerating WAN access for individual remote and roaming PC users.

Featured White Papers

Technical Overview of Nokia IP VPN

Nokia IP VPN is designed to the highest standards of reliability, performance, and functionality. In this white paper, you will learn about six key requirements for enterprise-class IP VPN, along with the technologies Nokia built into the IP VPN product line to support enterprises and carriers. Nokia IP VPN is the result of seven years of expertise in building highly reliable, available, and scalable IPSec hardware and software. With site-to-site VPN, remote access VPN, firewall, and dynamic routing capabilities, Nokia IP VPN gives you powerful tools to build enterprise-class VPNs.
Download whitepaper

How to Configure Nokia Secure Connector

As part of the Nokia Secure Access System, the Nokia Secure Connector provides an IPSec Client like behaviour but using SSL/TLS encryption. The Nokia Secure Connector is basically client software that has to be installed on the remote system. Its intent is to cover and secure the communication of all kind of Client - Server Applications. On the client workstation, the VPN client software looks like a normal Ethernet device (Windows can?t tell the difference). When the user logs into the VPN, the VPN client adjusts the routing tables on the client machine such that all traffic, or selected traffic, depending on configuration, is routed over the VPN connection, and the device becomes active and gets an IP address.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map