Remote access systems, such as Microsoft Remote Desktop Connection, Virtual Network Computing (VNC) and similar...
products, allow you to connect to a computer over the network and manipulate it with your mouse and keyboard as if you were sitting at the computer. When you connect to the remote system, you will be prompted to enter your username and password before gaining access.
Many enterprises use these two technologies in tandem for security reasons. Users who wish to make remote access connections to use computers on the corporate network must first connect to the VPN and then establish the remote access connection. This strategy prevents unknown Internet users from directly attempting unauthorized remote access connections, providing an added layer of security.
Dig Deeper on Network Access Control technologies
Related Q&A from Mike Chapple
Examine the important differences between stateful and stateless firewalls, and learn when each type of firewall should be used in an enterprise ... Continue Reading
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between ... Continue Reading