Access your Pro+ Content below.
History of IPSec, SSL VPN products: How will the market change?
This article is part of the August 2003 issue of Information Security magazine
Today's SSL VPN products address a single problem: secure remote access. Is that going to be enough to sustain the vendors in this market? Also see Read Lisa Phifer's cover story: Tunnel vision: Choosing a VPN -- SSL VPN vs. IPSec VPN History suggests that IT departments have love-hate relationships with "point" products. They love the convenience of self-contained operating systems and applications. Moreover, they don't have to be bothered hardening appliances. However, a complex layered security architecture that incorporates many point products is difficult to administer. Each product has its own policy model, user interface, log records and audit data. So, IT staffs want to consolidate functions into fewer devices that can be supervised from (ideally) one global management system. The marriage of IPSec VPNs and firewalls is an example of such consolidation. Will SSL VPNs follow suit? The history of IPSec VPN gateways illustrates how functional consolidation can take many forms. Joel Snyder of Opus One, an IT consulting and...
Access this Pro+ Content for Free!
Features in this issue
Choosing a VPN has become a complex undertaking. Lisa Phifer examines how SSL VPNs match up with their older IPSec cousins.
A global minerals firm seeking secure remote email tested other systems before choosing an SSL VPN.
Today's SSL VPNs address a single problem: secure remote access. Will that be enough to sustain the vendors in this market? History offers some clues.
Lisa Phifer separates the truth from fiction about VPNs.
Today's attacker can be anywhere, meaning network perimeter defense alone is futile. Change your thinking, and your tactics.
Columns in this issue
Combining device-based authentication technology with existing user-based authentication would be appealing for many organizations, but technical details remain unclear.