IPsec VPN Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What are the benefits of a tunnelless VPN?

    In this SearchSecurity.com Q&A, network security expert Mike Chapple reviews two common tunnelless VPNs: Secure Sockets Layer (SSL) and Group Encrypted Transport (GET). 

  • Gates touts secure access anywhere

    Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof. 

  • What tools can limit users' acess to applications and network resources?

    In this expert Q&A, Joel Dubin explains how SSL VPNS can limit outsider access to applications and network resources. 

  • VPN or RPC/HTTPS? Both have their place

    Some security practitioners may debate which access method is best for ensuring secure, remote access to Exchange, but as Lee Benjamin explains, both VPNs and RPC over HTTPS can be effective strategies, depending on an organization's needs. 

  • How do L2TP and PPTP differ from IPsec?

    There are different protocol options when setting up a VPN tunnel. SearchSecurity.com expert Mike Chapple reviews the choices and reveals the one that is most secure. 

  • Can open ports increase LAN exposure?

    Michael Chapple, SearchSecurity.com's network security expert, explains the risks of open ports and how to properly secure these exposed connection sites. 

  • Cisco patches flaws in multiple products

    Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products. 

  • Four ways to isolate sensitive servers

    When the security issue arises, a discussion of isolating a sensitive server usually follows. While often impractical, learn four ways to isolate sensitive servers if the need becomes a necessity. 

  • VPNs and remote access: Secure deployment, setup and strategies

    Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, guest instruct... 

  • Understanding IPsec identity and authentication options

    IPsec VPNs extend your network's security perimeter by connecting individual hosts or entire networks. Preventing unauthorized access starts with verifying the identity of those VPN tunnel endpoints. Using the wrong authentication method can lead to ...