Menu
SSL VPNs a good option for remote access

SSL VPNs a good option for remote access

While the move toward mobility is technology powered, it is business driven.

The mobility and remote-access boom is undeniable. Rapidly expanding wireless bandwidth coupled with the improving capabilities of laptop computers, mobile phones, personal digital assistants and other mobile devices is making it possible for organisations to adopt new means of satisfying the mobile workforce's demand for anytime, anywhere access to information.

While the move toward mobility is technology powered, it is business driven. Companies of all sizes recognize that remote access has the power to drive productivity, improve customer service and add agility to the corporate business model by allowing users timely and secure access to valuable resources regardless of location.

Although the benefits of remote access are extensive, the trend challenges organizations to maintain an all-inclusive view of who is entering the corporate network and to create a well-controlled but user-friendly environment to access sensitive information. Security is a prime reason that many organizations resist enabling remote access, or confine it to a select group of users.

Opening the infrastructure for remote connection always involves risk. Without proper safeguards, organizations are susceptible to data and identity theft, network abuse, viruses, worms and other security threats.

To reduce the risk many organizations turn to virtual private networks (VPN), which lets users access the company network via the Internet. Before implementing a VPN solution, it is important to consider not only security issues that can occur when users connect remotely, but to evaluate how much and which information your organization is willing to share over a remote connection.

If you are planning to transfer data that is in any way sensitive, be wary of preinstalled VPNs. Though most operating systems have built-in VPN protocols that can be implemented at low cost, you typically get what you pay for, as these protocols often rely on little more than usernames and passwords, usually lack robust authentication and encryption components, and can easily become open doorways that allow hackers to introduce worms and viruses.

Fortunately, vendors specializing in security solutions offer a range of products to secure network resources for remote use while effectively minimizing threats. Though just one option in the remote access arsenal, VPN is mature, proven and, when implemented correctly, a valuable tool in the IT security arsenal. The appeal of VPN technology largely stems from how easily it:

  • Restricts access to select applications and files,
  • Manages authorizations,
  • Protects the corporate network from damage, even if an infected laptop tries to connect, and
  • Enforces access policies.
Of course, not all VPNs are created equally, and there are a few different standards for VPN protocols -- many proprietary to particular vendors. Of these, however, the Secure Sockets Layer (SSL) is among the most popular because it uses the same encryption protocols as many e-commerce sites and Web-enabled applications. In short, this means it will be more compatible with the networks your remote workers connect through -- a critical consideration if your users are connecting via a wireless hot spot in an airport or coffee shop.

Because of ease of implementation, cross-compatibility and a wealth of options, SSL VPNs are expected be the primary remote-access method for more than two-thirds of teleworkers, more than three-quarters of contractors and more than 90% of casual employee access by 2008.

SSL is simple to install and leverages firewall ports already opened to secure Internet traffic, enabling users to connect into a network securely via a standard Web browser without the need to install special software. This alleviates connectivity problems with firewalls and negates the need to install software on the remote clients (e.g., desktops or laptops). SSL VPNs will support security policies that regulate access depending on the user, device or location. SSL can deny access if a less-than-secure situation is detected (for instance, logging on via an unsecured wireless LAN at a local coffee shop).


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Leading female front runners of the Kiwi ICT industry honoured at 2019 WIICTA

Leading female front runners of the Kiwi ICT industry honoured at 2019 WIICTA

Reseller News has honoured the leading female front runners of the New Zealand ICT industry at the 2019 Women in ICT Awards (WIICTA) in Auckland. The awards recognised standout individuals across six categories, spanning Entrepreneur, Rising Star, Shining Star, Community, Technical and Achievement. Photos by Gino Demeer.

Leading female front runners of the Kiwi ICT industry honoured at 2019 WIICTA
Reseller News kicks off awards season in 2019 with Judges' Lunch

Reseller News kicks off awards season in 2019 with Judges' Lunch

The 2019 Reseller News Innovation Awards has kicked off with the Judges Lunch in Auckland with 70 judges in the voting panel. The awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors. Photos by Christine Wong.

Reseller News kicks off awards season in 2019 with Judges' Lunch
Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomed 2018 inductees - Chris Simpson, Kendra Ross and Phill Patton - to the third running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing landscape of the technology industry in New Zealand, while outlining ways to attract a new breed of players to the ecosystem. Photos by Gino Demeer.

Reseller News welcomes industry figures for 2019 Hall of Fame lunch
Show Comments