The beauty of split tunneling is that your enterprise doesn't need to provide the general Internet access point...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
for a VPN user. With split tunneling, the VPN client automatically determines whether a network location is accessible through the virtual private network and, if it is not, passes it directly through the network connection. If users send only 10% of their traffic to your corporate network, you're letting their current access provider handle the other 90% of the load.
On the other hand, split tunneling may leave users with a false sense of security. If they're following instructions to "connect to the VPN from the road," employees may believe that all of their traffic, including their personal email and Web browsing data, is encrypted by the VPN. They may not realize that the traffic is open to interception on the local network.
From a compliance perspective, PCI DSS doesn't make any statements about split tunneling. I believe you could construct a rational argument for either approach during a compliance audit. Split tunneling wouldn't really reduce the risk of malware infecting your corporate network. If it's present on a machine before it connects to the VPN, it will still be present on that machine when it connects, regardless of your VPN tunneling strategy. If you wish to ensure that systems connecting to your VPN are free of malware, I'd recommend investigating the use of network admission control (NAC) technology.
Related Q&A from Mike Chapple
The updated HITRUST Common Security Framework allows organizations to manage privacy, security and compliance with one framework. Here's how it works...continue reading
A HIPAA audit covers privacy compliance, and organizations need to be prepared. Expert Mike Chapple discusses privacy in the audits.continue reading
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.