TITLE

Remote Connectivity Drives SSL VPNs

PUB. DATE
November 2004
SOURCE
Business Communications Review;Nov2004, Vol. 34 Issue 11, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the finding from Yankee Group Inc., which noted that IPSec remains the dominant remote access protocol. Among enterprises that adopt SSL VPNs, more than twice as many are doing so to extend remote connectivity than are using SSL to replace IPSec as a VPN technology. David Parks, senior analyst at Yankee Group said that enterprises are expanding and migrating their networks to meet the growing demand for remote access with their branch offices, remote and mobile users, and business partners. Network managers are searching for flexible and scalable solutions that enable greater mobility, increased security, higher bandwidth and better performance.
ACCESSION #
15056560

 

Related Articles

  • Vendors tout easier VPNs. Greene, Tim // Network World;1/21/2002, Vol. 19 Issue 3, p1 

    Reports the introduction of Internet-based IP Security (IPSec) VPN alternative computer software for corporate networks. Role of Secure Sockets Layer (SSL) technology on the function of IPSec in Web browsers; Advantage of VPN alternative on network security and accessibility of companies; Pros...

  • Encrypt Telnet via IPsec in 10 Steps. Fellinge, Jeff // Windows IT Pro;Nov2005, Vol. 11 Issue 11, p8 

    The article details the steps for encrypting Telnet over an IPsec network. To create Telnet traffic over IPsec, the list of objects to consider are IPsec policy, IPsec security rule, IP filter list and filter action. The use of IPsec in conjuction with Telnet improves the computer security of...

  • The IP VPN revenue trail. Bonanzinga, Roberto // Telecommunications - International Edition;Dec2005, Vol. 39 Issue 12, p30 

    The article presents information on how IP VPNs can generate profitable revenue for service providers. IP VPNs were introduced in the mid 1990s and used IPSec to create a secure virtual company network. They run over multi-protocol label switching private networks that are owned and operated by...

  • SSL or IPSec? Or both? May, Susan // Communications News;Oct2003, Vol. 40 Issue 10, p16 

    Examines which of the two primary technology, Internet protocol security (IPSec) and secure sockets layer (SSL), should be used for mobile work force. Key benefits of IPSec; Development of SSL; Factors to consider before choosing the appropriate solution.

  • Protocols Guide: Network Security Technologies and Protocols: Secured Routing Protocols: IPsec AH: IPsec Authentication Header.  // Network Protocols Handbook;2007, p97 

    Information on IP Authentication Header (AH) from a chapter of the book "Network Protocols Handbook," Fourth Edition, is presented. It refers to a key protocol in the Internet Protocol Security (IPsec) architecture that is used to provide connectionless integrity and data origin authentication...

  • FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec. JEONG-BEOM KIM; MOONBAE SONG; CHONG-SUN HWANG; SANGKEUN LEE // Journal of Information Science & Engineering;Sep2008, Vol. 24 Issue 5, p1329 

    As a de facto standard protocol, Internet protocol security (IPSec) provides secure communication between networked systems. One of the most common issues today in large-scale virtual private networks using IPSec is the problem of a stale security association, which occurs when the device at one...

  • Performance Analysis of IP Security VPN.  // International Journal of Computer Applications;Oct2010, Vol. 8, p5 

    The article presents a performance analysis of Internet Protocol Security (IPSec) for Virtual Private Networks (VPNs) for real time videoconferencing. It presents a comparison of four different environments, including without IPSec, IPSec with Authentication Header (AH), IPSec encapsulating...

  • Trusted License Distribution System Based on IPSec VPN for Mobile DRM. Jian Wang; Zhiyong Zhang; Fei Xiang; Weihua Yu // Open Electrical & Electronic Engineering Journal;2014, Vol. 8, p34 

    With the rapid development of mobile applications, DRM systems used for mobile terminals and wireless environment become popular. However, the present DRM schemes are not fit for mobile applications because of the new security problems in wireless environment and the limitations of mobile...

  • Firewalls on Strike. Tyler, Geoff // Management Services;Feb2003, Vol. 47 Issue 2, p22 

    The need for firewalls in computer network security may possibly end with the launch of standards devised by the international Internet Engineering Task Force. Called IPSEC, the standards address encryption and host-to-host security. In host-to-host security as addressed by IPSEC, standards are...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics