Next, consider the confidentiality controls in place. How are the two servers connecting to each other? Are they...
using SSL or another secure, encrypted protocol? If the servers are using a secure protocol, a VPN connection may add unnecessary overhead to the communication, as each message would be encrypted and decrypted twice. In that case, skip the VPN. On the other hand, if you're not confident in the security of the encryption used by the client/server protocol, an IPsec VPN configured to use strong encryption is a safe, reliable choice.
- A SearchSecurity.com reader asks whether Trojans and other malware can exploit split-tunnel VPNs.
- Expert Michael Cobb addresses the difference between Triple DES and DUKPT encryption for financial transactions.
Related Q&A from Mike Chapple, Enterprise Compliance
The HHS security risk assessment tool is designed to help healthcare providers meet the HIPAA security requirement. Expert Mike Chapple explains how ...continue reading
PCI DSS requirement 6.6 demands application security compliance through one of two options: an application firewall or a code review. Expert Mike ...continue reading
Are HIPAA-compliant hosting services a better option for compliance than a secure storage API? Expert Mike Chapple analyzes.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.