Email Alerts
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
Endpoint protection advice: Improving NAC with secure endpoints
This endpoint protection tutorial discuss several aspects of endpoint protection, including how to use endpoint fingerprinting, how to create an endpoint security lifecycle, how to solve problems related to insecure endpoints. Tutorial
-
Readers' Choice Awards 2011
Readers vote on the best remote access products, including IPsec VPN, SSL VPN, and combined systems and products, as well as other remote access products and services. Guide
-
Information security book excerpts and reviews
Visit the Information Security Bookshelf for book reviews and free chapter downloads. Information Security Book
-
Endpoint protection best practices manual: Combating issues, problems
Learn how to employ effective endpoint security controls, technologies and policies, and well as define methods and techniques for a multilayered endpoint defense system. Learning Guide
-
Quiz: Securing your first remote office
A five-question multiple-choice quiz to test your understanding of the content presented by expert David Strom in this lesson of SearchSecurity.com's Integration of Networking and Security School. Quiz
-
More from SearchSecurity.com -- December 2006
Highlights from the December 2006 issue of Information Security magazine. Monthly Magazine Highligh
-
PING with Suzanne Hall
In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure. Information Security maga
-
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Book Chapter
-
How to build an identity and access management architecture
Regardless of your company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. In this lesson, guest instructor Richard Mackey, principal with consultancy SystemExperts, helps you put togeth... Identity and Access Manag
- See more Essential Knowledge on Secure Remote Access
-
Column: The remote access security crisis
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore. News | 30 Mar 2012
-
Remote administration software weaknesses plague businesses
Attackers are finding an easy way into corporate networks often by targeting remote management weaknesses. Poorly configured software can lead to a data security breach. News | 13 Feb 2012
-
Certes Networks offers 10 Gbps variable speed network encryptor CEP10G
You don't have to sacrifice speed or bandwidth to adequately secure your carrier-grade enterprise WAN. Not, at least, according to Certes Networks (formerly CipherOptics). The network encryption vendor's latest addition to the Variable Speed Encrypto... News | 04 Feb 2011
-
Consortium to certify integrated endpoint security software
AVG, McAfee and Microsoft Corp. will work with the ISCA Labs to test and certify integrated endpoint security components. Article | 06 Dec 2010
-
Cisco warns of security appliance flaws
Cisco Systems warned customers Wednesday that its Adaptive Security and PIX Security appliances contained flaws affecting the security of VoIP and VPN connections. Article | 23 Oct 2008
-
As hype subsides, NAC moves ahead
IT pros still have an interest in NAC technology. But as Neil Roiter explains, the cost and complexity of NAC means the road to adoption will not be quick. Article | 20 Feb 2008
-
Cisco injects role-based access control into the network
Cisco Systems Inc. is adding role-based access control into its switches to carry role information to every enforcement point in the network. Article | 05 Dec 2007
-
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out. Article | 06 Sep 2007
-
Microsoft NAP-TNC compatibility won't speed adoption, users say
Users hail the new compatibility of Microsoft NAP and the Trusted Computing Group's TNC architecture. But they say it won't speed up their adoption timetables. Article | 21 May 2007
-
Online game exploits threaten IT security
Gary McGraw, chief technology officer of Dulles, Va.-based security firm Cigital Inc., is a security luminary with several books to his credit, including "Software Security: Building Security In," "Java Security" and "Exploiting Software." His latest... Interview | 14 Mar 2007
- See more News on Secure Remote Access
-
Secure remote access? Security-related remote access problems abound
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore. Column
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Tip
-
Android security settings and controls for Android enterprise security
Can Androids ever be secure enough for corporate use? Learn about Android security controls to enable effective Android enterprise security. Tip
-
Security benefits of virtual desktop infrastructures
In a highly regulated industry where security is critical, financial-services firms are turning to virtual desktop infrastructures. In this tip, Eric Ogren explains the security benefits of virtualized desktops and virtual workspace projects, includi... Tip
-
DirectAccess means 'always on' in Windows Server 2008 R2
Microsoft's new DirectAccess feature has the potential to change the way admins manage remote computers. But is it really secure? Tip
-
How to configure NAP for Windows Server 2008
The arrival of Windows Server 2008 ushers in a big portion of Microsoft's long-awaited Network Access Protection (NAP) initiative. In this tip, David Strom uses words and pictures to explain how to get started with NAP using the Network Policy Server... Tip
-
Secure options for remote SQL Server administration
Learn how to remotely administer SQL Server without compromising network security. Tip
-
Partner access: Balancing security and availability
Granting business partners access to corporate systems and data is essential to keep business processes on track, but doing so insecurely could mean exposing your enterprise to a plethora of insider threats. In this tip, contributor Joel Dubin unveil... Tip
-
VPN or RPC/HTTPS? Both have their place
Some security practitioners may debate which access method is best for ensuring secure, remote access to Exchange, but as Lee Benjamin explains, both VPNs and RPC over HTTPS can be effective strategies, depending on an organization's needs. Tip
-
Telecommuting security: Protecting sensitive data inside and out
The rash of laptop thefts in recent months has brought telecommuting and remote access security to the forefront of many information security professionals' minds. In this tip, Joel Dubin examines the mistakes made in the VA data theft case and offer... Tip
-
Keeping pace with emerging endpoint security technologies
Vendors have responded to the de-perimeterization of corporate networks with products designed to perform "health checks" of connecting devices, permitting access based on the security status of the endpoint. This article provides an overview of endp... Tip
- See more Tips on Secure Remote Access
-
Remote administration tools: How to develop a secure use policy
Matt Pascucci offers advice for developing a policy on secure use of remote management tools by network security staff. Answer
-
How to ensure secure remote access to shield enterprise clients, users
Expert Nick Lewis explains why remote access software is such a common attack target before providing simple steps to achieve secure remote access. Answer
-
What are the costs and benefits of Good Mobile Access for Android?
Expert Michael Cobb details the costs and benefits of Android GMA, which raises the bar for mobile browser security. Answer
-
How to secure Android devices: Advice for good Android lock patterns
Get advice from expert Michael Cobb on how to secure your Android device with good Android lock patterns. Answer
-
Remote access audit: Assessing remote desktop access software
Is your remote desktop access software really secure? Randall Gamby offers advice for conducting a remote access audit to validate security. Answer
-
Network perimeter security: How to audit remote access services
Matt Pascucci discusses the best tools to audit Internet-facing remote access services and boost network perimeter security. Answer
-
Secure remote access best practices: Guidelines for the enterprise
Remote access threats are on the rise. Use expert Randall Gamby's secure remote access best practices to help users make good security decisions. Answer
-
How to set up a site-to-site VPN to coexist with a DMZ
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Answer
-
Managing remote workers: Musts for setting up a secure home network
Is it the enterprise's responsibility to ensure that remote workers' home networks are secure? And, if so, how should they do it? Get expert advice from Nick Lewis. Ask the Expert
-
What to include in a remote access audit
When conducting a remote access audit, there are specific questions you should be sure to ask to make sure everything is secure. In this expert response, Randall Gamby describes what to look for. Ask the Expert
- See more Expert Advice on Secure Remote Access
-
RADIUS (Remote Authentication Dial-In User Service)
Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or s... Definition
-
authentication
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Definition
-
Revitalizing endpoint security with VDI desktops
Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren. Video
-
Endpoint integrity enforcement: The ins and outs
Learn about the latest in endpoint integrity enforcement and the questions you should ask vendors and groups within your own organization to stop infected, non-compliant endpoints from threatening your business. Video
-
Perimeter defense in the era of the perimeterless network
When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a perimeterless network and leading technologies for en... Video
-
NAC and endpoint security: The hard questions
Joel Snyder covers challenging endpoint security questions and explains how NAC technology can address them. Video
-
Remote administration tools: How to develop a secure use policy
Matt Pascucci offers advice for developing a policy on secure use of remote management tools by network security staff. Answer
-
How to ensure secure remote access to shield enterprise clients, users
Expert Nick Lewis explains why remote access software is such a common attack target before providing simple steps to achieve secure remote access. Answer
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Tip
-
What are the costs and benefits of Good Mobile Access for Android?
Expert Michael Cobb details the costs and benefits of Android GMA, which raises the bar for mobile browser security. Answer
-
How to secure Android devices: Advice for good Android lock patterns
Get advice from expert Michael Cobb on how to secure your Android device with good Android lock patterns. Answer
-
Remote access audit: Assessing remote desktop access software
Is your remote desktop access software really secure? Randall Gamby offers advice for conducting a remote access audit to validate security. Answer
-
Network perimeter security: How to audit remote access services
Matt Pascucci discusses the best tools to audit Internet-facing remote access services and boost network perimeter security. Answer
-
Secure remote access best practices: Guidelines for the enterprise
Remote access threats are on the rise. Use expert Randall Gamby's secure remote access best practices to help users make good security decisions. Answer
-
Secure remote access? Security-related remote access problems abound
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore. Column
-
Column: The remote access security crisis
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore. News
- See more All on Secure Remote Access
About Secure Remote Access
Learn how to secure remote access by finding vulnerabilities and threats with software, tools and tactics that will secure all remote access points.
Security Management Strategies for the CIO