Access "Tunnel vision: Choosing a VPN -- SSL VPN vs. IPSec VPN"
This article is part of the August 2003 issue of IPSec vs. SSL VPNs: Which cures your remote access ills?
If your organization is among the many that have struggled with the administrative headaches and costs of IPSec VPNs, going "clientless" sounds compelling. Given the demand for secure, easy, anytime/anywhere remote access for travelers and home office workers, the surge of interest in SSL/TLS-based VPNs isn't surprising. The key is deciding when to use IPSec and when to use SSL. It's not that one is right and one is wrong. IPSec and SSL VPNs both solve the problem, but SSL was a more tailored fit for us. Doug Torre Catholic Health System of Western New York "It's not that one is right and one is wrong," says Doug Torre, who is rolling out Neoteris SSL VPNs to give 500 doctors and clinicians remote access to medical applications and patient information for Catholic Health System of Western New York in Buffalo. "IPSec and SSL VPNs both solve the problem, but SSL was a more tailored fit for us." Torre still uses IPSec VPNs for site-to-site connections, such as connecting remote sites to the core network. In choosing an SSL VPN over IPSec, Torre wanted to avoid... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Tunnel vision: Choosing a VPN -- SSL VPN vs. IPSec VPN
by Lisa Phifer, Contributor
Choosing a VPN has become a complex undertaking. Lisa Phifer examines how SSL VPNs match up with their older IPSec cousins.
-
History of IPSec, SSL VPN products: How will the market change?
by Lisa Phifer, Contributor
Today's SSL VPNs address a single problem: secure remote access. Will that be enough to sustain the vendors in this market? History offers some clues.
-
Beyond network perimeter defense: A 'submarine warfare' strategy
by Dan Houser, Contributor
Today's attacker can be anywhere, meaning network perimeter defense alone is futile. Change your thinking, and your tactics.
-
Tunnel vision: Choosing a VPN -- SSL VPN vs. IPSec VPN
by Lisa Phifer, Contributor
-
-
Case study: SSL VPN enables secure remote email access
by Mathew Schwartz, Contributor
A global minerals firm seeking secure remote email tested other systems before choosing an SSL VPN.
-
VPN fast facts: True or false?
by Lisa Phifer, Contributor
Lisa Phifer separates the truth from fiction about VPNs.
-
Case study: SSL VPN enables secure remote email access
by Mathew Schwartz, Contributor
-
Columns
-
Examining device-based authentication
by Diana Kelley, Contributor
Combining device-based authentication technology with existing user-based authentication would be appealing for many organizations, but technical details remain unclear.
-
Examining device-based authentication
by Diana Kelley, Contributor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO