SSL VPNs---An Independent Taxonomy

Bruno, Charles; Suryaprasad, Deepa
November 2004
Business Communications Review;Nov2004, Vol. 34 Issue 11, p28
Trade Publication
This article presents a brief summary of the primary Secure Sockets Layer (SSL), virtual private networks (VPN) functions that should be central to any customer's SSL VPN evaluation. One of the ironies of SSL VPNs is that the complexity of this remote access technology can be masked almost completely from even the most neophyte user. Network managers can configure SSL VPNs to welcome users with the usual application interfaces, or with customizable Web pages, including hot links for the various resources of the corporate network. SSL VPNs simplify remote access to enterprise resources, but deployment requires careful planning and a thorough understanding of the security and access control choices involved. Four SSL VPN technology factors emerge as the key underpinnings of the technology: Application access methods; authentication/authorization services; endpoint security and access control policies. Four SSL VPN technology factors emerge as the key underpinnings of the technology: Application access methods; authentication/authorization services; endpoint security and access control policies. INSETS: Vendors Identity Top SSL VPN Criteria;Souped-up SSL For The Fast Lane.


Related Articles

  • Network Security Challenges for REMOTE ACCESS. Kroeter, Errett // Electronics World;May2009, Vol. 115 Issue 1877, p26 

    The article discusses the issue concerning remote access security. It explores the qualities of several technologies implemented by security professionals in the development of secure remote access solutions including firewall and Virtual Private Network (VPN). It views on the challenges faced...

  • A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR. Tomur, E.; Deregozu, R.; Genc, T. // Enformatika;2006, Vol. 18, p58 

    In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and...

  • Ask Dr. Internet. Blass, Steven // Network World;3/20/2006, Vol. 23 Issue 11, p41 

    The article discusses the advantages and limitations of SSL VPN and Windows Remote Desktop in providing a more secure way to provide remote access to internal intranet resources. The protocol-level security of the SSL VPN and the Remote Desktop are similar. Both are vulnerable to the same kinds...

  • Securing The Campus: A Case Study. Dorsz, Jeff // Business Communications Review;Oct2007, Vol. 37 Issue 10, p54 

    The article presents a case study of how the South Orange County Community College District (SOCCCD) is taking steps to protect its computer network and data assets. Many institutions that have networks are facing the "dissolving perimeter" problem, which refers to the inability of traditional...

  • New IPSec Beats SSL. Ford, Simon // Database & Network Journal;Aug2009, Vol. 39 Issue 4, p16 

    The article focuses on the Virtual Private Network (VPN) technology and the New Internet Protocol Security (IPSec) which is used to protect a company's network against internet-based attacks. New IPSec technology is optimized for remote access and distinguishes itself through universal...

  • Thinking outside the perimeter. Ang Chye Hin // NetworkWorld Asia;Oct/Nov2009, Vol. 5 Issue 5, p36 

    The article offers tips on how businesses and industries can secure their computer networks. It advises businesses and industries to secure communications to resources and confirm every user's identity. Scanning every node device to check its integrity and give users policy-based access to...

  • Primary remote access: Consider SSL VPNs. Oien, Stan // NetworkWorld Asia;Jun2008, Vol. 4 Issue 5, p18 

    The article reports on the implication of Secure Sockets Layer virtual private network (SSL VPN). According to the article, SSL VPN can address most of the security issues for remote users. It can also examine how much and which information a particular organization is willing to share over a...

  • Giving on-the-road staff secure network access. Janis, Terry // Behavioral Healthcare;Jan2008, Vol. 28 Issue 1, p34 

    The article discusses the use of virtual private network (VPN) technology by the Menninger Clinic. Aside from providing psychiatric treatment, the hospital also trains mental health professionals, shares best practices and collaborates globally on mental health research. The Menninger Clinic...

  • Remote XP support. Bannan, James // APC (Bauer Media Group);Dec2006, Vol. 26 Issue 12, p108 

    The article presents tips for gaining remote access to the Windows XP. By default, Windows XP is enabled for remote support using Windows Remote Desktop Protocol (RDP). It is an effective support tool which does not expect the other person to follow along with what the user is doing. Windows XP...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics