Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
SSL VPN : Understanding, evaluating and planning secure, web-based remote access

You're reading from   SSL VPN : Understanding, evaluating and planning secure, web-based remote access Understanding, evaluating and planning secure, web-based remote access

Arrow left icon
Product type Paperback
Published in Mar 2005
Publisher Packt
ISBN-13 9781904811077
Length 212 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (14) Chapters Close

SSL VPN
Credits
About the Authors
1. Introduction
1. Introduction to SSL VPN 2. SSL VPN: The Business Case FREE CHAPTER 3. How SSL VPNs Work 4. SSL VPN Security 5. Planning for an SSL VPN 6. Educating the User 7. Legacy Data Access 8. The Future of SSL VPN Technology A Review of TCP, IP, and Ports SSL VPN Gateways

End Point Security Concerns


Endpoint security concerns include:

  • Sensitive data remaining in insecure locations

  • Users neglecting to log out

  • Viruses reaching internal networks the SSL VPN

  • Worms reaching internal networks via tunnels created by the SSL VPN

  • Hackers accessing the corporate network by bridging networks via the SSL VPN

The Problem: Sensitive Data in Insecure Locations

During the course of a remote access session, users may download proprietary, sensitive, or confidential information to the devices that they use for access. Although private data was certainly stored on access devices during the era of earlier remote-access technologies, such data maintenance was not a problem as users gained access only from corporate devices assigned to them. Such devices were intended to store sensitive information. However, with the advent of SSL VPN and the expectation that users will access corporate resources from public or borrowed computers, storage of data on devices used for access poses a serious...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image