WHITEPAPER IPSEC VPN Vs. SSL VPN
|
|
|
- Herbert Terry
- 10 years ago
- Views:
Transcription
1 WHITEPAPER IPSEC VPN Vs. SSL VPN Introduction Whether a result of tele-working initiatives, contingencies for events such as 9/11, SARS, and the East Coast Blackout, or just addressing the need to balance longer work days with family commitments, companies are being driven to provide expanded access to corporate IT resources from outside the internal network. However, addressing this requirement can be problematic. One problem is that the modern enterprise network is a dynamic environment. Corporations have an everchanging variety of applications to address the needs of its diverse community of users. In addition to the many web-enabled resources, heterogeneous data centers continue to exist with legacy (AS/400, mainframe and other character-based) and client/server applications, as well as significant file server resources. The second issue is that it's no longer just company employees that require access to this heterogeneous environment. Contractors, business partners, and even customers may be included in the population of possible remote users. Lastly, in addition to the broad user population, access points are not longer controllable by IT. Employees may want to connect from an airport kiosk or a relative's computer while on vacation, contractors may be working off site using their own equipment, and customers may be accessing from a wi-fi hotspot. Until recently VPNs based on the IPSec protocol have been seen as the logical choice for providing secure network connectivity to remote users/networks because they leverage the Internet and thereby offer a lessexpensive alternative to dedicated point to point networks and dial-up infrastructures. However, extending an IPSec VPN to this large and complex realm of remote partners, suppliers, customers and employees, while still ensuring network protection, has been one of the great hurdles to a successful remoteaccess deployment. As a result, enterprises are turning towards SSL-based VPNs to satisfy the demands of today s heterogeneous enterprise networks and sophisticated end-user requirements, while ultimately delivering a lower total cost of ownership (TCO), especially when compared to IPSec VPNs. IPSec VPNs: For Site-to-Site Connectivity Traditional VPN s rely on IPSec (Internet Protocol Security) to tunnel between the two endpoints. IPSec works on the Network Layer of the OSI Model- securing all data that travels between the two endpoints without an association to any specific application. When connected on an IPSec VPN the client computer is virtually a full member of the network, able to see and potentially access the entire network. This virtual connection is the great strength of the IPSec design center: to protect private data transmissions between trusted networks when sent over an untrusted network like the Internet. The problem, however, is that in the past there was a clear segregation between trusted networks and untrusted networks. Trusted networks were intranetworks and employees. Today, such distinction is difficult. Is your co-location or disaster recovery facility trusted? Is your outsourcing vendors' network trusted? Is your employees' home network trusted? Are consultants trusted users? Are telecommuting employees trusted? The point is that, protecting the connection between trusted site-to-site networks is the sole task appropriate for deployment of an IPsec VPN. IPSec VPNs: Costly to scale and maintain Because IPSec VPNs operate at the network level and effectively provide the remote computer with full network visibility, as if it were a located on the corporate LAN, policy enforcement and security controls cannot be easily applied. As such, many companies are hesitant to deploy IPSec VPNs to anything but a corporate owned asset, and therefore to anyone but employees. Furthermore, remote access from a corporate asset almost always means a laptop computer, which despite the reductions in hardware costs, still results in at least an $800 per remote employee greater capital expense over a desktop computer. The majority of IPSec VPN solutions require that the remote node/network have special IPSec software installed on the client computer. This introduces a significant financial burden to maintain licenses for client software and for distributing IPSec clients to remote
2 machines and configuring them for access, which is challenging, especially when the Information Technology (IT) department does not have easy access to remote computers. Clearly, very few companies would even dream of providing a laptop computer and remote access to every single one of their employees. As a result, on average only select few (10-20%) of any given companies employees typically get VPN remote access. Even for those fortunate few that do get remote access, connectivity with an IPSec implementation is not always simple, nor guaranteed. Network address translation (NAT) and remote firewalls can have a dramatic, disabling effect on IPSec VPNs. Often times these configurations exist in environments where making changes to the network configuration is beyond the users control, i.e. in airport kiosks, or at customer locations. This often results in frustration, time consuming help desk calls, downgrading to a dial-up connection, or all of the above. SSL: Ubiquitous Secure Access Secure Sockets Layer (SSL) for remote access is based on a simple concept: use the encryption and authentication capabilities built into every Web browser to provide secure remote access to corporate applications. An important note, however, is that SSL isn't a new technology. A public key encryption system that was invented by Netscape, SSL is now an IETF standard under the moniker of Transport Layer Security (TLS). Poked and prodded by security experts around the world, banks, governments, and major retailers entrust billions of dollars in transactions to it. SSL: Initially for Extranets Several years ago companies recognized the potential of SSL-based browser access and have begun deploying web-enabled services through virtual Extranets. The problem, however, is that, although many products are now SSL-enabled, deployment becomes a one-off endeavor, and results in independent silos of remote access. For example, it would not be uncommon to see all the following SSL-based access points in a single company: An Outlook Web Access or inotes server for mail access A Citrix/Nfuse server for windows client/server windows applications A WRQ Reflection for the Web server for AS/400 access A custom J2EE application for employee timesheets An SAP Portal for customer inquiries. Each of these access points is a separate infrastructure, often replicated from what is used internally and each provides a potential attack point for hackers. The fact that management is distributed only serves to make the security risks even greater. And yet, with this entire infrastructure, and all the management/support resources required to maintain and operate it, users still don't have access to everything they need. By combining SSL-enabled Web browsers with an SSLenabled security appliance to terminate connections and provide policy enforcement and access control, so-called SSL VPNs can provide access to files, web-based, legacy client/server, and terminal applications. Most importantly, access can be from anywhere; home PCs, hotel business centers, Internet cafes, or a business partner's network; all without any special software. IPSec VPN Ties user to a single machine and requires deployment and configuration of software for every user you want to give remote access SSL VPN Ubiquity of Web browser access enables nearly universal access Requires no software to be installed or configured Firewalls and network address translation often interfere with access All traffic is sent over a single port, 443, which is already open or available through web proxies. Provides full network access without application authentication or authorization Allows granular access control to applications
3 SSL VPNs: Remote Access all Employees By going beyond the original purpose of SSL (securing communications with web servers), today s leading SSL VPNs combine the benefits of SSL with policy-based proxies to deliver on the promise of cost effectively making "application access as ubiquitous as voic access" Typically delivered as a single application-layer security appliance SSL VPNs address all application-access scenarios: Secure access to web-based applications, content, portals, and files Secure access for desktop client/server applications Secure clientless, access to remote legacy applications Addressing all three of these application-access scenarios means companies can deliver any IT resource to all remote end-users, and establish enforceable policy-based access, based on classifications: telecommuter, road warriors/traveling employees, partners, vendors, etc. As a result, although more users have access, internal security will be significantly enhanced. The key is that while IPSec is network-layer centric, SSL is application-layer centric and can provide the granular access control such that all users, both in and out of the physical office, and all connected foreign networks need explicit permission to access any resource within the intranet. They provide tunnels to specific applications rather than to the entire corporate LAN. So, users on SSL VPN connections can only access the applications that they are configured to access rather than the whole network. The AccessAnywhere SSL VPN: A Comprehensive Remote Access Solution In addition to addressing the core SSL VPN applicationaccess scenarios through AnywhereWeb, AnywhereClient, AnywhereApplication, the AccessAnywhere appliances provide elements typically required in a production remote access deployment. These include: a robust, stateful packet filtering firewall pre-integrated two-factor authentication services highly redundant system components lights-out management capability proactive system monitoring AnywhereWeb AnywhereWeb is the service component that provides ubiquitous access to web-based intranet/extranet applications and web-based, services such as Microsoft Outlook Web Access, Lotus inotes. It also contains two sub-components, File Access and Mail Access, which provide access to network file shares (i.e. NFS, FTP, SMB and Netware), and standards based e- mail servers. The core AnywhereWeb service delivers web based applications via a sophisticated URL rewriting, reverse HTTP proxy. The URL rewriter translates all of the URLs (for all HTML, JavaScript, and XML) to ensure that all intranet/extranet content is always retrieved from the AccessAnywhere appliance. The URL rewriter uses a powerful rules based XML engine to determine rewriting behavior. The default ruleset will permit most intranet and extranet content to be successfully rewritten and accessed remotely; additional rules can be written to support virtually any content or application. Using URL rewriting enables granular access control without having to specifically create mappings for resources as is done with traditional reverse proxies. AnywhereWeb File Access delivers a lightweight Java applet to the client browser to support access to network file servers. Users can browse, upload, download, delete, compress, mail and search for files on remote file servers. All traffic to the AnywhereWeb File Access applet is transmitted over the SSL session, and can connect to remote file systems via SMB (Windows NT/2000/XP, Linux/Samba), FTP, or NFS. Configurable MIME-types allows automatic launching of the file into a local application. AnywhereWeb Mail Access delivers either a standard HTTP application or a lightweight Java applet to the client browser to support access to non-web, standardsbased, servers. Users can connect to servers using IMAP and SMTP. AnywhereWeb Mail Access consists of an appliance component and an optional Java client component. AnywhereClient AnywhereClient enables a secure connection between an arbitrary client application on a system that is running a Java-enabled browser and a network resource behind a corporate firewall (i.e., servers, Database servers, Telnet Hosts, Legacy Hosts (3270/5250), Terminal Servers, Remote Desktops, etc.). Since all traffic encrypted and sent through an SSL datastream over port 443, the remote client can even be behind a firewall and/or HTTP proxy. AnywhereClient is a
4 lightweight rules-based Java applet that is downloaded to the client browser and configured to listen and accept requests on administrator determined ports. Once a request has been accepted, AnywhereClient will route the traffic to the AccessAnywhere appliance where the connection is terminated and access control rules are enforced. Having passed all ACL's the request is passed onto the LAN in native format. Since the confidential nature of the information being passed over a clientserver connection can vary greatly, and all encryption comes with a price, AnywhereClient can be configured to use specific encryption algorithms and key sizes on a rule by rule basis. As this implies, each connection results in different keys, providing significantly better security over single session key implementations. As an additional security feature, AnywhereClient can request acknowledgment and acceptance from the user anytime a new connection attempt is made, furthermore, this acceptance can be protected by a password. AnywhereID AnywhereID consolidates key security features into the AccessAnywhere appliance with the singular goal to build a flexible and agile access procedure that can accommodate mobile workers while still safeguarding corporate assets. Enhanced client security elements for two-factor authentication is integrated into the platform for fast and reliable deployment. With AnywhereID users will identify themselves against an integrated RSA ACE/Server using username/password and SecurID tokens. RSA SecurID authenticators function like an ATM card for your network, requiring users to identify themselves with two unique factors - something they know and something they have - before they are granted access. By deploying AnywhereID to users, administrators can take advantage of strong, two-factor authentication, one-time passwords, and the true mobility that users demand. AnywhereApplication AnywhereApplication provides a unique, non-intrusive, and modular way to provide client-less access to all corporate applications, including those that run on Microsoft Windows, UNIX, Linux, S/390 or AS/400 servers. There is no need to deploy client software, or modify networks, applications or the servers on which they run. AnywhereApplication provides seamless access all applications through a single, unified and familiar web-based interface. AnywhereApplication is a Java applet, which runs in the main AccessAnywhere browser window and communicates with the appliance through an AnywhereClient connection. By leveraging the dynamic nature of the Adaptive Internet Protocol, even applications with complex bandwidth interface elements (i.e. X11) can be delivered over slow WAN links. Additionally, client/server applications that do not perform well over anything but a LAN connection can be successfully deployed with the thin-client nature of AnywhereApplication. The administrator controls granting of application 'availability', with access ultimately being controlled by the back-end application server by whatever method is uses. AnywhereApplication will facilitate 'single-sign-on' to most back-end application servers, making moving through heterogeneous applications seamless for remote users. SSL VPNs: Achieving a Balance between, Security, Ease of Use and TCO While IPSec VPNs will continue to be deployed, their predominance and legacy will be as site-to-site VPNs. The less appropriate role of providing users with remote access to applications and data is quickly becoming the sole domain of SSL-based solutions. SSL VPNs overcome the limitations of discrete Web-only SSL technologies to offer end-users the ability to access all information and applications, universally from any browser without sacrificing. IT administration and support is a fraction of that for an IPSec VPN because there isn't any complicated software client to deploy or manage and infrastructure costs are dramatically reduced versus deploying point SSL-based access technologies. These factors, along with the ease of use, and speed of deployment, drive the total cost of ownership of secure remote access to the point that, like voic , it can be made available to the entire company.
5 IPSec VPN vs. SSL VPN: Feature Matrix Features IPSec VPN AccessAnywhere SSL VPN Confidential Communications Yes - RC4, 3DES, etc ciphers Yes - RC4, 3DES, etc ciphers Authentication Proprietary Flexible - LDAP, Radius, Active Directory, Token, PKI Authorization Network Level (Hosts/Protocols) Application Level (URL, File Share, Host, Port, etc) Resource Access Options Entire Network Web, Client/server, File shares, Mainframes, Terminal Services, Terminal emulation User Device Support Limited - Corporate PC Corporate PC, Kiosk, Home PC, PDA, etc End Point Security Limited Host Integrity Checker, Cache Clean-up, Virtual Desktop, Malware Protection Hardened Appliance Yes Yes Site-to-Site VPN Yes Yes Network Firewall Yes Yes Audit, Analysis, Reports Limited Extensive High Availability Yes Yes Scalability Subset of employees Entire employee population User Experience Complex - special hardware, software, certificates Simple - Internet browser Product Line breadth Small to Large Small to Large Relative Cost of Ownership High Low All rights reserved. AccessAnywhere, the AccessAnywhere Logo, AnywhereWeb, AnywhereClient, AnywhereApp, and AnywhereID are trademarks, registered trademarks, or service marks of Caveo Technology Group Inc. in Canada, and in other countries. Other product and company names mentioned are trademarks of their respective owners. Corporate Headquarters 2425 Matheson Blvd East, 8 th Floor Mississauga, ON, L4W 5K4 Tel: (905) Fax: (905)
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs
Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs Introduction Connecting remote users to corporate resources securely is not a new problem for IT. But today s end users with changing work
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow
IPSec vs. SSL: Why Choose?
Remote VPN Access from Anywhere An OpenReach Backgrounder Comparing VPN Technologies 660 Main Street Woburn, MA 01801 888.783.0383 www.openreach.com Copyright 2002,, which is solely responsible for its
Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition
Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
2003, Rainbow Technologies, Inc.
Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Securing Citrix with SSL VPN Technology
Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed
SSL-Based Remote-Access VPN Solution
Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to
What the Experts Say
THE CHANGING LANDSCAPE OF SECURE REMOTE ACCESS What the Experts Say "Enterprises that want easier and more flexible ways to deploy secure remote access should consider SSL for new investments and as upgrades
RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief
RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication The need to ensure that only authorized users are granted access is mission critical. Businesses increasingly need
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
Licenses are not interchangeable between the ISRs and NGX Series ISRs.
Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
Citrix Access Gateway
F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome
Alteon SSL Accelerator. A remote access gateway for today s extended enterprise
Solution Brief Alteon Application Switch Alteon SSL Accelerator Alteon SSL VPN A remote access gateway for today s extended enterprise Alteon SSL VPN features Clientless remote access Application-layer
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
The BiGuard SSL VPN Appliances
The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium
Cisco ASA 5500 Series VPN Edition
Data Sheet Cisco ASA 5500 Series VPN Edition The Cisco ASA 5500 Series Adaptive Security Appliance is a purpose-built platform that combines best-in-class security and VPN services for small and medium-sized
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Secure Remote Access Give users in office remote access anytime, anywhere
Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Understanding VPN Technology Choices
Understanding VPN Technology Choices Presented by: Rob Pantazelos, Network Administrator Brown Rudnick, LLP The most current version of this presentation can be downloaded at: http://www.brownrudnick.com/nr/ilta2008_vpn.ppt
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
I d like our employees to be able to access all the files in our network that are important to them anywhere and anytime. Simply and securely.
VPN Distances? Companies network themselves with their branches, set up decentralized offices, encourage teleworking or integrate mobile employees and external service providers into their networks. The
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: [email protected] Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: [email protected] Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
Cisco ASA 5500 Series VPN Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series VPN Edition for the Enterprise CISCO ASA 5500 SERIES VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST-EFFECTIVE REMOTE ACCESS The Cisco ASA 5500 Series VPN Edition
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN
10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw
Cisco Virtual Office Flexibility and Productivity for the Remote Workforce
Cisco Virtual Office Flexibility and Productivity for the Remote Workforce Cisco Virtual Office Overview Q. What is the Cisco Virtual Office? A. The Cisco Virtual Office solution provides secure, rich
Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise CISCO ASA 5500 SERIES SSL / IPSEC VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST- EFFECTIVE REMOTE ACCESS The Cisco
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN
SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN Written for WatchGuard Technologies by Lisa Phifer, Core Competence May 2009 Introduction Years ago, businesses started turning to SSL VPNs
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a
SSL VPN A look at UCD through the tunnel
SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology
SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology Introduction SSL is a well-established, high performing and secure technology for Internet transactions. The strength of
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Building Your Complete Remote Access Infrastructure on Windows Server 2012
Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad
Virtual Private Networks Secured Connectivity for the Distributed Organization
Virtual Private Networks Secured Connectivity for the Distributed Organization FORTINET VIRTUAL PRIVATE NETWORKS PAGE 2 Introduction A Virtual Private Network (VPN) allows organizations to securely connect
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Clientless SSL VPN End User Set-up
37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
HotSpot Enterprise Mobile Printing Solution. Security Whitepaper
HotSpot Enterprise Mobile Printing Solution Security Whitepaper August, 2012 2012, Ricoh Americas Corporation. All rights reserved. Ricoh and the Ricoh logo are registered trademarks of Ricoh Company,
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
SSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
CISCO REMOTE ACCESS VPN SOLUTIONS
CISCO REMOTE ACCESS VPN SOLUTIONS Remote Connectivity for Any Deployment Scenario Sami Iivarinen Systems Engineer Cisco Systems Finland 1 Agenda Solution Overview Cisco WebVPN SSL VPN Connectivity 2 Cisco
Windows in a Browser Secure Remote Access with HOB RD VPN
Windows in a Browser Secure Remote Access with HOB RD VPN by Patrick Oliver Graf HOB March 2006/ Rev. 3 February 2010 1 of 5 Introduction This white paper describes the possibilities of Secure Remote Access
INTRODUCING KERIO WINROUTE FIREWALL
KERIO TECHNOLOGIES, INC. KERIO WINROUTE FIREWALL 6.1 REVIEWER S GUIDE JUNE 2005 WHAT IS KERIO? Kerio Technologies, Inc. provides Internet messaging and firewall software solutions for small to medium sized
White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments
White Paper SSL vs. IPSec Streamlining Site-to-Site VPN Deployments May 2011 SiteDirect Access. Security. Delivery. Introduction Traditionally, corporate users rely on IPSec for site-to-site access. However,
IPSec vs. SSL VPN: Transition criteria and methodology
IPSec vs. SSL VPN: Transition criteria and methodology A comparison of SSL VPN and IPSec VPN technologies and recommended implementations based upon use case Abstract Business mobility has driven the need
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
Deliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
How To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 [email protected] Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE
BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE The future trend is towards a universal access control model, one which inverts the network so that the protective perimeter is concentrated
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through
