SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN
|
|
|
- Stella Daniels
- 10 years ago
- Views:
Transcription
1 SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN Written for WatchGuard Technologies by Lisa Phifer, Core Competence May 2009 Introduction Years ago, businesses started turning to SSL VPNs to reduce the cost and complexity of remote access. Early SSL VPNs focused on relieving IT pain associated with IPSec VPN clients, using web browsers to help more remote workers reach common business applications. This value proposition prompted many companies to rethink legacy VPNs and launch successful SSL remote access deployments. Since then, business needs have continued to evolve. Today's workforce is more mobile than ever demanding access to a wide variety of business applications and systems, from increasingly diverse devices and locations. IT departments must now find more efficient, effective ways to satisfy ever-changing connectivity needs. Moreover, they must do so without exposing corporate assets to malware or breach, while maintaining the control and visibility mandated by industry regulations and privacy laws. Fortunately, SSL VPN gateways have also matured. Contemporary products have surpassed old access limitations, tightened IT controls, and increased automation. As your organization moves to master today's mobility challenges, it's time to dissolve any lingering misconceptions and demand more from your next SSL VPN. Myth #1: SSL VPNs only support web and browser-interfaced applications FACT: Today's SSL VPNs offer a choice of access methods to support any TCP/IP application, from "clientless" browser interfaces to thin-client SSL tunneling. Early SSL VPNs began as HTTP proxies, letting workers reach web applications through a VPN gateway using nothing more than an ordinary browser. To reach non-web applications, SSL VPNs implemented browser-based GUIs and content translators that were specific to each business program. For example, workers might use a Java frontend to interact with network file servers, relying on an SSL VPN gateway to translate HTTP requests into native Windows SMB protocols. WatchGuard Technologies
2 But to keep up with rapidly changing business needs, SSL VPNs had to expand far beyond browser-interfaced applications. Today's products offer browser-launched thin clients that can support just about any application by tunneling non-web protocols over SSL. Many thin clients intercept messages sent to specified ports, forwarding TCP sessions through the VPN gateway to private application servers. Some intercept IP packets, routing all user traffic through the VPN gateway into the private network. SSL VPN thin clients can significantly expand business application reach, while continuing to leverage the browser as a ubiquito us access delivery platform. Figure 1: SSL VPNs offer flexible access methods Myth #2: SSL VPNs are no different than ordinary web portals FACT: SSL VPNs can deliver highly customized portal views that reflect and enforce each user's individual resource and application access rights. SSL VPN gateways may have started as simple web access concentrators, but contemporary products now deliver sophisticated, dynamic access portals. A static web portal gives everyone the same browser-based view of a single service. Access is controlled independently by each server, with diverse user groups requiring different static portals to compartmentalize data. SSL VPNs can accomplish this more efficiently and effectively by offering highly customizable portals that provide each individual with granular access to all authorized applications and resources and nothing more. Furthermore, SSL VPNs may consider not just authenticated user identity, but the endpoint used to obtain access. Application and resource rules may then be used to determine who is granted access, the actions they can perform, and how resources are named and displayed. In this way, organizations can present portal views, tailored to each individual and situation, while relying on a single gateway to control and track access for all. Myth #3: SSL VPNs don't support access from PDAs or phones FACT: SSL VPNs may now be accessed from a broad range of devices, including those running Windows CE, Symbian, Palm, and even WAP phones. SSL VPNs that focused exclusively on browser-based access reached many more endpoint devices than legacy IPSec VPN clients ever could. But some early web frontends and thin-clients created new compatibility concerns, like ActiveX controls that could only run on Win32 PCs or browser interfaces that were hard to use on small screen PDAs. WatchGuard Technologies page 2
3 As workforce mobility grew, securing access from wireless handheld devices was no longer "nice to have" for many enterprises, this is now a business necessity. Fortunately, SSL VPNs have also expanded endpoint platform support. Thin-clients have been ported to Linux and Mac OS and tapped Java's near-universal reach. New web frontends adapt automatically to mobile operating environments on Windows Mobile, Symbian, and Palm smartphones. Some SSL VPNs even support "ordinary" cell phones with WAP browsers. As new mobile devices like the iphone and Android continue to emerge, contemporary SSL VPNs are well-positioned to deliver consistently secure access across the entire mobile workforce. Figure 2: SSL VPNs support a wide variety of endpoints and applications Myth #4: SSL VPNs expose corporate assets to malware on unmanaged PCs FACT: SSL VPNs can evaluate endpoint health and compliance before deciding whether and how to grant access to authorized business resources. By using ordinary web browsers, early SSL VPNs made remote access possible from unmanaged endpoints such as Internet cafés, teleworker home PCs, and business partners. But unmanaged systems are inherently vulnerable to malware, and even well-intentioned people have an unfortunate tendency to leave sensitive data behind. In such environments, an authenticated, encrypted tunnel is simply not good enough corporate resources and data must also be insulated from loss, theft, or attack. SSL VPNs have evolved to address these challenges not just on unmanaged PCs, but for all endpoints. Specifically, SSL sessions can be used as a conduit to evaluate each endpoint's integrity before authenticating the user or authorizing access. For example, some SSL VPNs can query endpoint OS version/patches and anti-virus presence/signatures. Some can look for trusted endpoint identifiers like hardware addresses or host certificates. Some SSL VPNs can even check managed endpoints for compliance with corporate security policies. Armed with this intelligence, businesses can make access decisions to mitigate malware threats. For example, policies might deny endpoints that cannot satisfy minimum safety requirements, grant tunneled access from compliant laptops, and permit narrow "kiosk mode" access elsewhere. Myth #5: SSL VPN authentication can be compromised by keystroke loggers FACT: SSL VPNs can deter this threat using strong authentication methods, paired with external authentication servers or built-in strong authentication services. WatchGuard Technologies page 3
4 Malware itself has evolved; organized cyber-criminals are increasingly focused on personal identify theft for financial gain. Spyware has grown common especially trojans that turn compromised endpoints into remotely managed attack platforms. Keystroke logger trojans are of particular concern to VPN administrators because they might capture a reusable text password before endpoint security checks can be completed. Contemporary SSL VPNs address this threat. Some can display "virtual keyboards" to avoid text passwords. Most can be paired with enterprise two-factor authentication servers (e.g., RSA SecurID). But balancing streng th, ease of use, and cost can be challenging. To facilitate strong authentication, some SSL VPNs can generate one-time passwords that don't require hardware tokens or external authentication server purchase. Some can even map VPN strong authentication methods to less robust LAN logins (e.g., Active Directory), delivering single sign-on experience without exposing corporate passwords to keystroke loggers. Myth #6: SSL VPNs leak corporate data onto home and public PCs FACT: SSL VPNs can avoid this by limiting what each user can do, keeping data safe during an SSL session, and deleting it at log-off. SSL VPNs have long reduced risks posed by home and public PCs by enforcing granular access controls. For example, policies may deny thin-client SSL or IP tunnels from endpoints that are not fully trusted, or provide read-only access to files, displayed in graphic rather than text format. In addition, most SSL VPNs offer post- activity (e.g., session cleanup options that can automatically disconnect inactive users and delete traces of user browser history, cached objects, temp files). However, as SSL VPNs becomes the dominant form of secure remote access, workforces are shifting. More and more SSL VPN users are "frequent flyers" that access corporate resources repeatedly from the same unmanaged endpoint. Those users can operate more productively when given broader access and some degree of persistence. For example, pairing SSL VPN sessions with secure virtual desktops can provide a consistent, safe execution environment that remains encrypted in between sessions. In short, all unmanaged endpoints are not public PCs more discriminating SSL VPNs can improve user experience without compromising security. Myth #7: SSL VPN connections go down a lot and require repeated logins FACT: VPNs can use high availability and single sign-on techniques to keep users continuously connected and maximally productive. IPSec VPN users know the pain of lost connectivity. Network layer tunnels require reestablishment when IP addresses change, disrupting application sessions and requiring repeated logins if not to the VPN, then to each application. All too often, IPSec users end up frustrated and unproductive especially nomadic wireless users. SSL VPNs inherently bypass these IPSec limitations. SSL sessions resume automatically after loss of connectivity, quickly and without user intervention. Some SSL VPNs go further to facilitate network roaming. For example, a user's authenticated state may be preserved during brief loss of connectivity or reinstated transparently by single sign-on. SSL VPNs that tunnel IP packets use virtual addresses that do not change when roaming. Finally, high availability SSL VPN clusters can keep users continuously connected during gateway maintenance or failure. Myth #8: SSL VPN policies are complex and hard to manage FACT: SSL VPNs can use central policy managers and be integrated with enterprise authentication servers and directories to simplify administration. WatchGuard Technologies page 4
5 Certainly, there is plenty of potential for SSL VPN policies to grow unwieldy. With granular policies, multiple access methods, endpoint security checkers, and customizable portals, VPN administrators have a lot of power that must be wielded wisely to achieve desired results. Here, experience shows; mature SSL VPN products have undergone years of refinement. Techniques like group or role-based policies, reusable policy objects, and templates have streamlined SSL VPN administration. SMBs can benefit from wizards and built-in integrity checkers or authentication services that might otherwise lie beyond their means. Larger businesses can leverage integration with enterprise authentication servers, singlepoint policy administration for multiple gateways, and consolidated logs for compliance audits and reporting. Myth #9: SSL VPNs are just as difficult to deploy as IPSec VPNs FACT: SSL VPNs avoid client installation and provisioning by offering clientless and thin client alternatives, accompanied by user auto-enrollment and self-service management. SSL VPNs were created to address the single-most significant cost associated with IPSec VPNs: client software installation, configuration, and update. Today, clientless SSL VPN access can meet the needs of many users, avoiding software administration altogether. However, some worry that SSL VPN thin clients simply require a different kind of software administration. That might be true for some products, but not for all SSL VPNs. Thin clients and web frontends are evolving to reduce platform dependencies. SSL VPNs that do offer installable clients use portal page links to supply them. In most cases, portals just launch the best thin client automatically, eliminating user involvement or guesswork. Downloading thin clients and web frontends as needed means the latest version is always used. And there are no client configuration updates; policy is applied at the gateway for each session. SSL VPNs can even offer selfservice web interfaces for user-directed changes, like updating passwords or customizing portal shortcuts. In short, SSL VPNs not only bypass the cost of installed clients the browser paradigm reduces total cost of administration. Conclusion Clearly, SSL VPNs have come a long way over the past few years. New SSL VPN gateways can do considerably more than their predecessors, at a lower total cost of ownership. However, product capabilities do vary shop carefully and select a solution that meets your own business needs. To learn about the WatchGuard SSL 100, visit uard.com or contact you reseller. About the WatchGuard SSL 100 The WatchGuard SSL 100 appliance is the ideal solution for small to mid-size business networks that need easy-to-use, secure remote access at a great price. The beauty of this appliance is its flexibility. You can make your SSL deployment as simple or as sophisticated as your business needs require. Small businesses looking for extreme ease of use can have access to standard network resources remotely with virtually no management overhead. Businesses with more complex needs can choose a mix of tunnel and portal-based resources, provide tech support to remote desktops, and control access based on granular user/device criteria. Other features of the WatchGuard SSL 100 include: An all-in-one appliance just plug and play with no additional software components to buy, install, or manage Client and clientless access including Vista 32-bit and 64-bit support WatchGuard Technologies page 5
6 Easy access to essential corporate resources including , web conferencing, and CRM from any web-enabled device with optional non-native applications, including SSH and RDP, delivered through a remote user s web browser for maximum productivity Comprehensive endpoint integrity checking ensures network protection by allowing organizations to configure and enforce endpoint compliance including checks for anti-virus, anti-spyware, firewall software, and many other device attributes Session clean up removes all traces of access from the endpoint including file deletion and cache cleaning to prevent data leakage through another user s covert re-entry to network resources Local and third party authentication support, including strong authentication, ensures only authorized users can access the network, keeping intruders out Consolidated auditing collects all information about access, identity, and system events in a central repository for quick insight into user and system-based activities IT administrators can integrate solution with existing third-party authentication solution, such as Microsoft Active Directory, or rely on onboard LDAP server to configure local authentication, as well as use built-in two-factor authentication including SMS-based tokens and web keypad for identity validation WatchGuard SSL 100 allows you to deliver exactly the level of remote access your business needs, at a price you can afford. For more information about the WatchGuard SSL 100 appl iance, visit About The Author Lisa Phifer is President of Core Competence Inc. ( a consulting firm focused on business use of emerging network and security technologies. At Core Competence, Lisa draws upon her 27 years of network design, implementation, and testing experience to advise companies large and small regarding network security best practices to manage risk and meet business needs. She teaches and writes extensively about a wide range of technologies, from wireless/mobile security to virtual private networking and network access control. For more information about the WatchGuard VPN solutions, contact We solve IT Ltd on or us at [email protected] We Solve IT Ltd Dudley House, Millfields Road, Wolverhampton WV4 6JE Telephone: [email protected] web: WatchGuard Technologies page 6
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Secure Remote Access Give users in office remote access anytime, anywhere
Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and
Securing Citrix with SSL VPN Technology
Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
2003, Rainbow Technologies, Inc.
Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Citrix Access Gateway
F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome
SSL-Based Remote-Access VPN Solution
Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition
Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Mobile Access R75.40. Administration Guide. 13 August 2012. Classification: [Protected]
Mobile Access R75.40 Administration Guide 13 August 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Release Version 4.1 The 2X Software Server Based Computing Guide
Release Version 4.1 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
Fireware XTM v11.6.8 is a maintenance release for XTM 21, XTM 22, and XTM 23 wired and wireless devices.
Fireware XTM v11.6.8 Release Notes Supported Devices Fireware XTM OS Build WatchGuard System Manager Build XTM 21, 22, and 23 XTM 21-W, 22-W, and 23-W 451352 N/A WatchGuard recommends you use WSM v11.9.x
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
GlobalProtect Overview
GlobalProtect Overview Whether checking email from home or updating corporate documents from the airport, the majority of today's employees work outside the physical corporate boundaries. This increased
Secure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
WHITEPAPER IPSEC VPN Vs. SSL VPN
WHITEPAPER IPSEC VPN Vs. SSL VPN Introduction Whether a result of tele-working initiatives, contingencies for events such as 9/11, SARS, and the East Coast Blackout, or just addressing the need to balance
Release Version 3 The 2X Software Server Based Computing Guide
Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
Cisco ASA 5500 Series Business Edition
Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
CISCO REMOTE ACCESS VPN SOLUTIONS
CISCO REMOTE ACCESS VPN SOLUTIONS Remote Connectivity for Any Deployment Scenario Sami Iivarinen Systems Engineer Cisco Systems Finland 1 Agenda Solution Overview Cisco WebVPN SSL VPN Connectivity 2 Cisco
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Deliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public
REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers
WatchGuard SSL 2.0 New Features
WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks
EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
Avaya Identity Engines Portfolio
Key benefits Improved security and granular control: More secured wireless and guest access, role-based access control and compartmentalization of the network to segment and protect data Reduced costs:
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
Cisco ASA 5500 Series VPN Edition
Data Sheet Cisco ASA 5500 Series VPN Edition The Cisco ASA 5500 Series Adaptive Security Appliance is a purpose-built platform that combines best-in-class security and VPN services for small and medium-sized
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Secure Virtual Assist/ Access/Meeting
Secure Virtual Assist/ Access/Meeting Easy-to-use tools for secure remote support, PC control and collaboration Technical support by phone, email, chat and pre-installed remote support clients can be cumbersome,
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Clean VPN Approach to Secure Remote Access for the SMB
Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
AnyConnect VPN Client FAQ
AnyConnect VPN Client FAQ Document ID: 107391 Questions Introduction What level of rights is required for the AnyConnect client? Is a reboot required after AnyConnect is installed/upgraded? Is it possible
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity
Campus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
Remote Vendor Monitoring
` Remote Vendor Monitoring How to Record All Remote Access (via SSL VPN Gateway Sessions) An ObserveIT Whitepaper Daniel Petri March 2008 Copyright 2008 ObserveIT Ltd. 2 Table of Contents Executive Summary...
ADMINISTRATOR S GUIDE
STONEGATE SSL VPN 1.4.3 ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
GoToMyPC Technology Making Life Simpler for Remote and Mobile Workers
Technology Making Life Simpler for Remote and Mobile Workers Learn why is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop. www.gotomypc.com Today, secure
Clean VPN Approach to Secure Remote Access
Clean VPN Approach to Secure Remote Access A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond the Perimeter
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Juniper SSL VPN Notes Page 1
Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types
