Best Practices for Secure Remote Access. Aventail Technical White Paper
|
|
|
- Esmond Moore
- 10 years ago
- Views:
Transcription
1 Aventail Technical White Paper
2 Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3. One-time passwords, especially from public machines 4 4. Policy by end-user environment, not just user identity 5 5. Disabled split tunneling when connected to the corporate network 5 6. Extra protection for kiosks and other public PCs 5 Summary 6 About Aventail 6
3 Overview SSL VPNs from companies like Aventail provide anywhere access that increases employee productivity. However, that key advantage brings with it increased risk. That s because today s organizations support remote access that is harder to manage, more public, and more mobile than ever before. You have more users accessing from untrusted environments such as kiosks and wireless hot spots. To reduce risk due to the increasing number of vulnerabilities these scenarios can cause, customers are tightening their remote access information security policies. As the maker of the most widely deployed SSL VPN, Aventail provides more than half a million users and over 500 global organizations with complete secure remote access solutions. We have the opportunity to see common trends both the pitfalls to avoid and the consistently successful practices in how customers safeguard remote access to their networks. Here is the list of some of the best practices for secure remote access implemented by our customers: 1. Strong, secure access policy for the corporate network 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 3. One-time passwords, especially from public machines 4. Policy by end-user environment and not just user identity 5. Disabled split tunneling, when connected to the corporate network 6. Extra protection for kiosks and other public PCs Additionally, instead of prohibiting unsafe behavior on paper with no enforcement mechanisms in place, information security professionals are using technology to automatically enforce these essential policies. The Aventail SSL VPN solutions provide an easy way for you to implement and enforce these best practices, thus enhancing security while simplifying your end user experience as well as your information security technology infrastructure. Give your employees and business partners secure remote access to the data they need but maintain control of your policy. 1.Strong, secure access policy for the corporate network Access control policies have become increasingly complex. Just a few years ago, only a few select employees had broad access to everything on the corporate network from remote locations using dial-up, and each application was secured and managed individually in a demilitarized zone. Then IPSec VPNs, which promised the convenience of centralized security policy, administration, and management, became an appealing option for remote access. Unfortunately, IPSec VPNs were designed to facilitate site-tosite communications between branch offices rather than to accommodate remote access users. They required client software that was difficult to deploy and expensive to support. Additionally, some IPSec VPNs revealed private IP addresses inside the corporate network, making the internal network vulnerable to denial-of-service and other network attacks. Finally, IPSec VPNs did not offer the granular access control essential for controlling access to internal applications for different types of users. As more employees gained remote access privileges, the management burden and risks for unauthorized access increased. Consolidating all of the remote access users employees, customers, and business partners using one centralized secure remote access platform that offered strong encryption and authentication, and granular access control appealed to security professionals. SSL VPNs provide a simple, clientless way to deliver access to business partners, customers, and employees from an Internet browser without exposing your network environment or having to manage client software. Aventail SSL VPNs provide proxy technology as well as granular access control to eliminate direct network connections to your corporate network, while providing transparent access to authorized users. With Aventail s SSL VPN, you can reduce the complexity and support costs associated with IPSec client software on endusers desktops. Aventail s granular access control enables you to limit access based on parameters like source (IP Address or Host Name) and port; destination; user identity and/or group affiliation; time, day, and/or date; application and/or service; authentication method and/or encryption algorithm; and pathlevel access for Web access and Windows file shares even down to the specific file. That means you can limit each user partners and employees to relevant applications, Web sites, and other corporate resources, down to the specific URL. For example, instead of simply identifying a user as an employee with access to the whole corporate network, the Page 3
4 individual can be identified as a member of the sales organization. A sales group is then provided with access to the CRM applications, the corporate portal and sales file shares, but not to the ERP or the company s financial systems. Aventail enables you to shelter your internal network domain name system (DNS) and network topology, and reduces the risk of unauthorized access or attacks on your network resources. For additional security, Aventail integrates with popular access control or authorization systems for more complex authorization scenarios. No direct connections to the internal network are allowed. So, as a part of their security policy, many organizations require active and up-to-date personal firewall, anti-virus, and other desktop security applications on all PCs. It is especially important to enforce this on remote PCs before the remote access connection is established. However, enforcement of this policy is challenging. If the required desktop security applications stop running for any reason, the user must either remediate the problem or the system has to shut down the connection. If the user is at a public kiosk, he or she may be denied access if appropriate security applications are not installed. 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops If a PC is infected with worms or viruses, these malicious applications will try to spread to your corporate network using the encrypted tunnel of the VPN. Active personal firewall and anti-virus applications eliminate worms and viruses from PCs, thus protecting the corporate network. What is Aventail Connect? Aventail Connect is a Windows agent that provides authorized users with secure access to the entire corporate enterprise. Remote or traveling employees with a corporate laptop would take advantage of this full-access VPN. This option is also appropriate in situations where IT wants tight integration with the user s operating system for additional security and ease of use. Connect provides: Transparency for the end user. Deep Microsoft Windows integration enables an effortless user experience, including Microsoft single sign-on and mapped drives. Effortless administration. AutoUpdating makes ongoing administration simple. Advanced security options. Aventail Connect supports advanced security options, like split tunneling control, personal firewall integration, and anti-virus detection. In addition to Aventail Connect, we seamlessly integrate clientless access options, including browser-based access for web applications and file shares, and Aventail OnDemand, a Java agent for secure client/server application access. For more information, please go to Today, Aventail Connect, our Web-deployed Windows SSL VPN agent for full secure access to network resources, automatically detects all running desktop security applications. If the required application is not running or is not up-to-date, Aventail Connect warns the user and provides him or her with an option to remediate this problem. Unless the problem is resolved, the Aventail SSL VPN shuts down the connection. 3. One-time passwords, especially from public machines Although they are convenient, static passwords present a number of known security issues. First, users have a tendency to choose dictionary words or other relatively easy-to-guess static password and then re-use them across multiple systems. Second, a number of password-guessing tools are readily available on the Internet. Easy passwords combined with sophisticated passwordguessing tools make remote access systems reliant on static password fairly insecure. Also, in public places, hackers can use a number of methods to intercept static passwords from shoulder-surfing by standing right behind the legitimate user, to key stroke logging with hidden software, to network eavesdropping using legitimate network monitoring tools. Organizations reduce the risk of password guessing or interception by investing in one-time password mechanisms or other authentication Page 4
5 methods that generate authentication credentials that are not reused. Aventail integrates with all of the commonly used authentication systems, including RSA SecurID, Secure Computing Safeword, Swivel technologies and others. The user is required to authenticate to the Aventail SSL VPN using his one-time password or other authentication credential before the network connection is established. 4. Policy by end-user environment, not just user identity Employees, customers and business partners are pushing the envelope for convenience. They demand access to corporate resources from public places, potentially exposing the corporate network to worms and viruses that hide and spread on public computers and networks. As a result, information security professionals now must take into consideration the level of risk in the user s environment, not just the user s identity. With End Point Control, Aventail helps you enforce policy based upon the level of trust that you have for the user's environment, not just the level of trust that you have for the user. Using Aventail to manage access by environment and Aventail partners to make those environments safer, you can truly deliver secure access from virtually anywhere. Aventail's partners enforce policies for firewalls, intrusion detection, virus protection and other client-side security issues, while Aventail encrypts and authorizes access to all corporate resources with access control policies based on both the user's identity and the security of the user's environment. Today Aventail delivers End Point Control through source-based access policy rules, control over split tunneling, strong authentication support, automatic detection of desktop security applications, cache protection, AutoCompletion blocking, user authorization, and crypto level access control. This allows Aventail to first detect the individual and their environment, then to secure that environment, and finally to deliver the right level of access to that user. 5. Disabled split tunneling when connected to the corporate network Many VPN products allow connections to multiple networks simultaneously. A user can browse the Web using a public Internet connection while concurrently accessing his or her corporate network through a VPN. This is called split tunneling. Unless properly configured, split tunneling can make your corporate network accessible to a hacker connected to the public Internet. Public Internet, cable networks and wireless LANs are all shared among multiple users, and therefore introduce additional risks. These networks are frequently accessed using a home PC that may not be securely configured for sharing or networking. If this is the case, a hacker can use the shared or public network to gain access to the home PC. A legitimate user can initiate a VPN connection to the corporate network, while a hacker is accessing the employee s home PC. If this happens, the intruder can gain access to the corporate network through the compromised home PC, unbeknownst to the end user or the corporate security manager. Even worse, with broadband, many of these home PCs are always on, providing intruders with uninterrupted opportunity to cause harm. To prevent hackers from gaining access to the corporate network by utilizing a shared network and improperly configured home PC, organizations explicitly turn off split tunneling capabilities on their VPNs. The Aventail SSL VPN supports split tunneling, but perhaps more importantly, it provides organizations an ability to turn it off. Organizations can implement split tunneling control settings enterprise-wide, for specific groups, or for specific users. 6. Extra protection for kiosks and other public PCs Public machines, including PCs at Internet cafes or airport kiosks, can be dangerous. Public machines can be infected with viruses or Trojan horses that capture user key strokes or execute malicious code. Additionally, the next person in line to use the PC can hit the Browser Back button and see potentially sensitive information from the previous user s login session. Given the risky nature of this environment, additional training about kiosk security is common for employees who tend to use public machines for remote access. In fact, many organizations go a step further and ban users from accessing their corporate network from public machines altogether. Unfortunately, some users may forgo compliance to such a draconian policy for convenience, when running to catch that last-minute flight and needing to download their itinerary from . If the corporate policy indeed prohibits access from kiosks, the VPN technology should be able to identify kiosks and prohibit or limit access from these machines. Alternatively, through the use of one-time passwords, organizations can allow limited access from Page 5
6 public machines, while eliminating cached and saved data stored on the public machines. Aventail End Point Control provides the best possible protection for public PCs with cache cleaning. Additionally, if the corporate policy mandates no access from public machines, the Aventail SSL VPN can be configured to allow access with the Aventail Connect agent only, which is not available on public machines. Summary Every time a remote user accesses your internal network, your organization faces a number of different risks. With the best practices described above, you can mitigate the most serious risks, while enabling users convenient and flexible access. As the leading SSL VPN vendor, providing thousands of customers with complete secure remote access solutions, Aventail has a proven track record of enabling secure access for the real world. We can help you refine your secure remote access policy and enforce this policy with our award-winning SSL VPN. About Aventail Aventail, the recognized SSL VPN leader, provides clientless VPN appliances and services that give employees and business partners transparent, secure, anywhere access to any application. Aventail makes the world's most widely deployed and proven SSL VPN, with more than half a million users and more than 500 global organizations using it. With the most award-winning SSL VPN on the market, Aventail has been recognized as the fastest growing SSL VPN vendor and has been named a Gartner Magic Quadrant leader three times since Page Aventail Corporation. All rights reserved. Aventail, Aventail ASAP, Aventail Connect, Aventail EX-1500, and Aventail OnDemand, and their respective logos are trademarks, registered trademarks, or service marks of Aventail Corporation. Other product and company names mentioned are the trademarks of their respective owners. WP /1 Corporate Headquarters 808 Howell Street Seattle, WA Tel Fax [email protected] Aventail Europe Ltd Tel +44 (0) [email protected] Aventail Asia-Pacific Tel [email protected]
Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs
Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs Introduction Connecting remote users to corporate resources securely is not a new problem for IT. But today s end users with changing work
Secure Remote Access Give users in office remote access anytime, anywhere
Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly
Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition
Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns
Citrix Access Gateway
F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control
SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control Step by step guide on how to configure SonicWALL Aventail SSL VPNs to detect the
SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN
SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN Written for WatchGuard Technologies by Lisa Phifer, Core Competence May 2009 Introduction Years ago, businesses started turning to SSL VPNs
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
Cyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
Virtual Private Networks Secured Connectivity for the Distributed Organization
Virtual Private Networks Secured Connectivity for the Distributed Organization FORTINET VIRTUAL PRIVATE NETWORKS PAGE 2 Introduction A Virtual Private Network (VPN) allows organizations to securely connect
Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X
QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
The BiGuard SSL VPN Appliances
The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium
WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6
WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated
SSL VPN Security Secure Remote Access from Any Web Browser
SSL VPN Security Secure Remote Access from Any Web Browser Joseph Steinberg Director of Technical Services, Whale Communications May 16, 2003 Abstract: SSL VPN is an exciting new technology that allows
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Cisco ASA 5500 Series VPN Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series VPN Edition for the Enterprise CISCO ASA 5500 SERIES VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST-EFFECTIVE REMOTE ACCESS The Cisco ASA 5500 Series VPN Edition
How to Select an SSL VPN for Remote Access to Microsoft SharePoint Portal Server 2007
How to Select an SSL VPN for Remote Access to Microsoft SharePoint Portal Server 2007 Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents Scope... 2 Executive
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
Secure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise CISCO ASA 5500 SERIES SSL / IPSEC VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST- EFFECTIVE REMOTE ACCESS The Cisco
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Connecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
Cisco ASA 5500 Series VPN Edition
Data Sheet Cisco ASA 5500 Series VPN Edition The Cisco ASA 5500 Series Adaptive Security Appliance is a purpose-built platform that combines best-in-class security and VPN services for small and medium-sized
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed
RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access
RSA SECURITY SOLUTIONS Secure Mobile & Remote Access SECURE MOBILE & REMOTE ACCESS empower workforce mobility strengthen relationships & create new opportunities reduce exposure to network breaches support
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments
APPLICATION READY SOLUTION GUIDE Key Benefits Eliminate 70% of unwanted email, before it reaches your Exchange Servers Gain more than 25% server capacity with SSL and Compression offload Experience up
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief
RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication The need to ensure that only authorized users are granted access is mission critical. Businesses increasingly need
Alteon SSL Accelerator. A remote access gateway for today s extended enterprise
Solution Brief Alteon Application Switch Alteon SSL Accelerator Alteon SSL VPN A remote access gateway for today s extended enterprise Alteon SSL VPN features Clientless remote access Application-layer
Clean VPN Approach to Secure Remote Access
Clean VPN Approach to Secure Remote Access A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond the Perimeter
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Additional Security Considerations and Controls for Virtual Private Networks
CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Deploying F5 Application Ready Solutions with VMware View 4.5
F5 White Paper Deploying F5 Application Ready Solutions with VMware View 4.5 VMware View is the leading desktop virtualization solution built for delivering desktops as a managed service. F5 BIG IP devices
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments
White Paper SSL vs. IPSec Streamlining Site-to-Site VPN Deployments May 2011 SiteDirect Access. Security. Delivery. Introduction Traditionally, corporate users rely on IPSec for site-to-site access. However,
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
WHITEPAPER IPSEC VPN Vs. SSL VPN
WHITEPAPER IPSEC VPN Vs. SSL VPN Introduction Whether a result of tele-working initiatives, contingencies for events such as 9/11, SARS, and the East Coast Blackout, or just addressing the need to balance
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Easy and Secure Remote Access with Cisco QuickVPN
Easy and Secure Remote Access with Cisco QuickVPN With the widespread use of mobile technology and an increased reliability of wireless networks, more businesses can separate work from place. It is now
7 Key Requirements for Secure Remote Access
W H I T E P A P E R 7 Key Requirements for Secure Remote Access The world is more dynamic and unpredictable than ever before and market forces are driving change at an unprecedented rate across both business
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Disaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
Using a Firewall General Configuration Guide
Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide. http://www.peplink.com - 1 - Copyright 2015 Peplink
Peplink Balance http://www.peplink.com - 1 - Copyright 2015 Peplink Introduction Introduction Understanding Peplink VPN solutions Peplink's VPN is a complete, seamless system that tightly integrates your
DIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
