SSL and TLS VPN Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IPSec vs. SSL VPNs: Which cures your remote access ills?

    Figuring out how to choose a VPN used to be simple. No more. In this issue, we examine the state of the enterprise VPN product market, specifically IPSec vs. SSL, and how one health care organization made its choice. Also this month: the "submarine w... 

  • IPSec VPN vs. SSL VPN: Comparing respective VPN security risks

    When it comes to VPNs, which of the two most-used options -- IPSec or SSL -- presents the greater security threat? Expert Anand Sastry describes the pros and cons of each, as well as how to test your VPN implementations for security. 

  • SSL vulnerabilities: Trusted SSL certificate generation for enterprises

    Presentations at both Black Hat and Defcon 2010 demonstrated serious vulnerabilities in the SSL protocol, which, considering how widely used SSL is, could mean security problems for many enterprises. In this tip, Nick Lewis examines the researchers' ... 

  • Clientless SSL VPN vulnerability and Web browser protection

    In a recent US-CERT advisory, clientless SSL VPN vulnerabilities were listed as posing serious threats to Web browser security. In this tip, learn possible actions to take for Web browser protection. 

  • How SSL-encrypted Web connections are intercepted

    Enterprises and attackers alike have found ways to sniff private Web traffic, even when it's encrypted. Sherri Davidoff reviews how encrypted Web connections can be sniffed, and ways that users can reduce their risk. 

  • Debian: A niche OS with a not-so-niche security flaw

    A recently discovered flaw in the Debian version of Linux meant that any OpenSSL keys generated during the past 20 months could be guessed in a matter of hours. But does the vulnerability suggest broader security issues for Linux? Michael Cobb explor... 

  • Secure file copying with WinSCP

    In his latest Downloads column, Scott Sidel examines WinSCP, an open source SFTP and FTP client for Windows. Sidel explains how the tool's optional interfaces, multiple secure authentication mechanisms and strong security features make it a must-have... 

  • Secure remote access: Closing the Windows Mobile Smartphone loophole

    After years of waiting, smartphones are finally being used to access corporate networks. But security programs for Windows laptops won't run as-is on Windows Mobile devices, leading users to engage in risky behavior. In this tip, Core Competence's Li... 

  • Bringing the network perimeter back from the 'dead'

    In the past year, a number of security professionals from consulting firms have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, offers network security expert Mike Chapple. In this spirited ti... 

  • How Juniper and F5 SSL VPNs can handle endpoint security

    It's not easy setting up an endpoint security system, especially when using an existing SSL VPN architecture. In this tip, expert David Strom uses words and pictures to illustrate the steps needed to enable endpoint security using the SSL VPNs from J... 

  • VPN or RPC/HTTPS? Both have their place

    Some security practitioners may debate which access method is best for ensuring secure, remote access to Exchange, but as Lee Benjamin explains, both VPNs and RPC over HTTPS can be effective strategies, depending on an organization's needs. 

  • See more Tips on SSL and TLS VPN Security
  • wildcard certificate

    A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains. 

  • SSL VPN (Secure Sockets Layer virtual private network)

    An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser... (Continued) 

  • Secure Sockets Layer (SSL)

    SSL (Secure Sockets Layer) is a commonly-used protocol for managing the security of a message transmission on the Internet; it uses a program layer located between the Internet's HTTP and TCP program layers. 

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. 

  • server accelerator card (SSL card)

    A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites. 

  • Secure Shell (SSH)

    Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. 

About SSL and TLS VPN Security

In this Secure Sockets Layer (SSL) VPN and TLS how-to, get advice on using SSL certificates, configuration, server, authentication, security and how to enable SSL.