Email Alerts
-
IPSec vs. SSL VPNs: Which cures your remote access ills?
Figuring out how to choose a VPN used to be simple. No more. In this issue, we examine the state of the enterprise VPN product market, specifically IPSec vs. SSL, and how one health care organization made its choice. Also this month: the "submarine w... E-Zine
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
VPNs and remote access: Secure deployment, setup and strategies
Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, guest instruct... Identity and Access Manag
-
Quiz: IPsec vs. SSL VPNs
Test your knowledge of IPsec and SSL VPNs with this quiz, and click through to our additional resources to help you determine which technology best suits your organization's needs. Security Quiz
-
IPsec vs. SSL VPNs quiz answers
Security Quiz Answer
-
Crypto basics: VPNs
In this excerpt of Chapter 3 from "Cryptography for Dummies," author Chey Cobb explains how virtual private networks (VPNs) use encryption to secure data in transit. Book Chapter
-
Remote access as an attack vector
In this excerpt of Chapter 7 from "The Black Book on Corporate Security," authors Howard Schmidt and Tony Alagna analyze how "unmanaged" remote access can serve as an attack vector. Book Chapter
-
Lesson/Domain 5 -- Security School: Training for CISSP Certification
Security School webcasts are focused on CISSP training. This lesson corresponds to the telecommunications and networking domain in the CISSP exam's "Common Body of Knowledge." School
-
Infosec Know IT All Trivia: IPsec
Test your knowledge of Internet Protocol Security. Quiz
-
History of IPSec, SSL VPN products: How will the market change?
Today's SSL VPNs address a single problem: secure remote access. Will that be enough to sustain the vendors in this market? History offers some clues. Feature
-
Tunnel vision: Choosing a VPN -- SSL VPN vs. IPSec VPN
Choosing a VPN has become a complex undertaking. Lisa Phifer examines how SSL VPNs match up with their older IPSec cousins. Feature
- See more Essential Knowledge on IPsec VPN Security
-
Federal telework: Mitigating the security risk
Federal IT managers will likely see greater demands to facilitate and improve telework infrastructures at their agencies. News | 11 Aug 2010
-
Black Hat 2010: Complacency over VPN security and management unacceptable
New research from NCP Engineering points out that companies are complacent about VPN security configurations, and poorly managed VPNs are often at the heart of large data breaches. Article | 26 Jul 2010
-
VoIP tools, attacks could increase threat
Tools are available to automate VoIP attacks, but the threat remains low until VoIP communications is more pervasive in the workplace. Article | 12 Nov 2008
-
When Microsoft Vista and VPNs don't mix
Papa Gino's is ahead of many companies in deploying Windows Vista, thanks to its involvement in the Microsoft TAP program. But VPN compatibility has been a sticking point. Article | 22 May 2007
-
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof. Article | 06 Feb 2007
-
Cisco patches flaws in multiple products
Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products. Article | 24 Aug 2006
-
Report suggests security practices lag behind requirements
Enterprises are failing to confront threats to mobile devices, according to a survey, and as a result are suffering security breaches. Article | 08 Feb 2006
-
Security Bytes: New flaws affect Cisco, Check Point
Cisco confirms a security hole in its IOS HTTP Server while Symantec warns of a flaw in the Check Point VPN-1 SecureClient application. Article | 18 Jan 2006
-
Review: The latest 'array' of SSL VPNs strong in management
But Array Networks' SPX5000 also has rich functionality, including full or split tunneling to facilitate IPSec. Article | 05 Dec 2005
-
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Article | 21 Nov 2005
- See more News on IPsec VPN Security
-
IPSec VPN vs. SSL VPN: Comparing respective VPN security risks
When it comes to VPNs, which of the two most-used options -- IPSec or SSL -- presents the greater security threat? Expert Anand Sastry describes the pros and cons of each, as well as how to test your VPN implementations for security. Tip
-
VPN or RPC/HTTPS? Both have their place
Some security practitioners may debate which access method is best for ensuring secure, remote access to Exchange, but as Lee Benjamin explains, both VPNs and RPC over HTTPS can be effective strategies, depending on an organization's needs. Tip
-
Four ways to isolate sensitive servers
When the security issue arises, a discussion of isolating a sensitive server usually follows. While often impractical, learn four ways to isolate sensitive servers if the need becomes a necessity. Tip
-
Understanding IPsec identity and authentication options
IPsec VPNs extend your network's security perimeter by connecting individual hosts or entire networks. Preventing unauthorized access starts with verifying the identity of those VPN tunnel endpoints. Using the wrong authentication method can lead to ... Tip
-
Pen testing your VPN
Your VPN is a vital gateway into your network for your company's road warriors, telecommuters and other remote users. Unfortunately, it's also a gateway for the less-than-scrupulous predators prowling the Internet for access to your network. This tip... Tip
-
2006 Products of the Year: Remote access
Information Security magazine and SearchSecurity.com surveyed their readers to identify the best products of 2006. Here are your choices for remote access solutions. Tip
-
Step-by-Step Guide: How to create a VPN for your wireless network
With wireless networks proliferating its critical that you understand what it takes to build a VPN for a wireless gateway. Brien Posey outlines a Windows-based procedure in this step-by-step guide. Tip
-
IPsec and SSL VPNs: Solving remote access problems
Learn how to solve remote access problems in this Information Security Decisions presentation by security expert Joel Snyder. Tip
-
How to repair a compromised VPN
Peer advice on how to repair a VPN's Routing and Remote Access console after the network has been compromised by a DoS attack. Tip
-
How to set up DNS for Linux VPNs
This tip explains how to set up DNS for Linux VPNs so you can access machines that are not available on the Internet at large. Tip
- See more Tips on IPsec VPN Security
-
VPN troubleshooting: Isolating VPN session timeout issues
Expert Matt Pascucci offers VPN troubleshooting advice, specifically best practices for troubleshooting VPN session timeout and lockout issues. Answer
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Answer
-
How secure is a VPN? Exploring the most secure remote access methods
Virtual private networks are a common means of providing remote access, but expert Mike Chapple addresses whether it is the most secure option available. Answer
-
How to set up a site-to-site VPN to coexist with a DMZ
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Answer
-
How to find a real IP address using proxy server logs
While using proxy server logs to identify the real IP address of an attacker using a proxy server is technically easy, there are other difficulties along the way. Expert Mike Chapple explains. Answer
-
How to set up a split-tunnel VPN in Windows Vista
Setting up a split-tunnel VPN in Vista can help quicken network flow in the enterprise. In this expert response, Mike Chapple explains the steps to create a split-tunnel VPN. Ask the Expert
-
What is the difference between a VPN and remote control?
Mike Chapple reviews VPNs, remote controls, and how the two security technologies can be used in tandem. Ask the Expert
-
A short enterprise VPN deployment guide
When deploying a VPN in your enterprise, first check out this guide for some basic best practices, including how to define authentication requirements for the VPN and create a written user access policy. Ask the Expert
-
Can S/MIME, XML and IPsec operate in one protocol layer?
It is possible to build security systems that reside within a single layer of the OSI model, but why limit yourself? Ask the Expert
-
How to create a secure network through a shared Internet connection
When setting up a corporate network through a shared Internet connection, security is of paramount importance. Learn best practices for creating this kind of network from expert Mike Chapple. Ask the Expert
- See more Expert Advice on IPsec VPN Security
-
Internet Key Exchange (IKE)
The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access. Definition
-
network encryption (network layer or network level encryption)
Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level. Definition
-
From the ground up: Creating secure WLANs
In this video, Lisa Phifer of Core Competence Inc. focuses on creating secure WLANs, including WLAN basics and implementation best practices. Video
-
VPN troubleshooting: Isolating VPN session timeout issues
Expert Matt Pascucci offers VPN troubleshooting advice, specifically best practices for troubleshooting VPN session timeout and lockout issues. Answer
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Answer
-
How secure is a VPN? Exploring the most secure remote access methods
Virtual private networks are a common means of providing remote access, but expert Mike Chapple addresses whether it is the most secure option available. Answer
-
How to set up a site-to-site VPN to coexist with a DMZ
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Answer
-
How to find a real IP address using proxy server logs
While using proxy server logs to identify the real IP address of an attacker using a proxy server is technically easy, there are other difficulties along the way. Expert Mike Chapple explains. Answer
-
IPSec VPN vs. SSL VPN: Comparing respective VPN security risks
When it comes to VPNs, which of the two most-used options -- IPSec or SSL -- presents the greater security threat? Expert Anand Sastry describes the pros and cons of each, as well as how to test your VPN implementations for security. Tip
-
Federal telework: Mitigating the security risk
Federal IT managers will likely see greater demands to facilitate and improve telework infrastructures at their agencies. News
-
Black Hat 2010: Complacency over VPN security and management unacceptable
New research from NCP Engineering points out that companies are complacent about VPN security configurations, and poorly managed VPNs are often at the heart of large data breaches. Article
-
How to set up a split-tunnel VPN in Windows Vista
Setting up a split-tunnel VPN in Vista can help quicken network flow in the enterprise. In this expert response, Mike Chapple explains the steps to create a split-tunnel VPN. Ask the Expert
- See more All on IPsec VPN Security
About IPsec VPN Security
Find out why IPsec VPNs are a powerful protocol, how they work and how they can solve remote access issues. This resource also offers advice on IPsec configuration, deployment, encryption, tunneling and security.
Security Management Strategies for the CIO