Remote computer access to files and systems must secure


This article can also be found in the Premium Editorial Download "Information Security magazine: Comparing seven top integrated endpoint security suites."

Download it now to read this article plus other related content.

Organizations are overhauling strategies to meet the challenges of the mobile workforce.

As workforces grow mobile and diverse, organizations are challenged to enable secure remote access from unconventional and unmanaged devices. Today, two out of three enterprises have a traditional VPN for managed laptops. But most are waging an uphill battle to stop infected laptops from penetrating networks via VPN, and few have a comprehensive strategy for mobile handheld devices.

From accommodating mergers to expanding application breadth, many companies are finding it necessary to revamp strategies that no longer meet their needs. Simply connecting travelers to the corporate network is no longer sufficient, or even acceptable. New products and approaches have emerged to reduce risks and fill gaps, from browser-based and mobile VPNs to endpoint security and identity-based network access control (NAC).

From a technology standpoint, businesses can deliver the appropriate degree of resource access to anyone, anywhere, using any device and connection. But from a strategic perspective, how do companies determine which new approach can best address their objectives?

For Norwich University in Vermont, it was an evolutionary process. The university tried half a dozen platforms to deliver remote access to 800 faculty members and 2,000 students. "Our

    Requires Free Membership to View

security challenges are great, for we are required to provide various levels of support and application access," says Richard Quelch, network manager at Norwich. "While each product [we tried] provides great connectivity for specific application types, no single product does everything well."

Ultimately, Norwich combined several products. Sonic-WALL's Aventail, Citrix Systems' NetScaler and Cisco Sys-tems' ASA appliances now provide remote access; endpoints are scanned before access and then monitored by Cisco MARS. "I think we're finally where we want to be," says Quelch. "It's a huge relief that we can put restrictions on what [users] connect to and keep a record of their activity. We're providing better access, getting more applications out to people, while keeping them more secure."

This was first published in November 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: