Completing The Secure Application Access Puzzle

Piscitello, David
July 2005
Business Communications Review;Jul2005, Vol. 35 Issue 7, p46
Trade Publication
The article reports that workforce mobility is a relatively recent phenomenon, but the phrase itself has already become a tired one. Equally tired are the IT staffs of large organizations that are still struggling to deliver mobility in a secure way, using virtual private networks based on IPSecurity (IPSec VPNs). With nearly a decade of deployment experience as a benchmark, it's safe to say that IPSec remote access has proven overly cumbersome, more difficult and less reliable than promised. And the struggle has only begun. Just as organizations are finally managing to deploy IPSec remote access to large user populations in tightly controlled environments, workforces are redefining secure access needs. The original remote access paradigm--a worker connecting to the corporate network from a company owned laptop, using company-installed software, over a modem connection--no longer satisfies business needs. Today's workforce requires access to whatever applications they need to conduct business, transparently, from any location, when convenient and necessary, using any device, over any network.


Related Articles

  • Nortel's Contivity picks up SSL. Newman, David; Snyder, Joel // Network World;10/11/2004, Vol. 21 Issue 41, p12 

    This article states that a Secure Sockets Layer virtual private network (SSL VPN) Module 100 blade slides into Nortel Networks' Contivity IPSec VPN boxes. The module provides remote access to a wide group of LAN-based applications at decent speeds. However, administrators would not like the...

  • New IPSec Beats SSL. Ford, Simon // Database & Network Journal;Aug2009, Vol. 39 Issue 4, p16 

    The article focuses on the Virtual Private Network (VPN) technology and the New Internet Protocol Security (IPSec) which is used to protect a company's network against internet-based attacks. New IPSec technology is optimized for remote access and distinguishes itself through universal...

  • Trusted License Distribution System Based on IPSec VPN for Mobile DRM. Jian Wang; Zhiyong Zhang; Fei Xiang; Weihua Yu // Open Electrical & Electronic Engineering Journal;2014, Vol. 8, p34 

    With the rapid development of mobile applications, DRM systems used for mobile terminals and wireless environment become popular. However, the present DRM schemes are not fit for mobile applications because of the new security problems in wireless environment and the limitations of mobile...

  • A Fresh Look at VPNs. McKean, Kevin // InfoWorld;12/8/2003, Vol. 25 Issue 48, p8 

    Focuses on virtual private networks (VPN) based on the Security Sockets Layer standard. Security features of VPN based on the IPSec standard; Convenience offered by VPN; Benefits from the SSL standard.

  • IPsec VPN.  // Network Dictionary;2007, p261 

    A definition of the term "IPsec VPN" in computer security is presented. The term refers to the virtual private network based on the IPsec technologies, which is the primary layer 3 VPN technology. It typically works on the edges of a security domain, which encapsulates a packet by wrapping...

  • Creating a Better VPN Connection. Schultz, Keith // InfoWorld;12/8/2003, Vol. 25 Issue 48, p36 

    Presents a comparison between the IPSec and the Security Socket Layer (SSL) virtual private network (VPN) standards. Advantages of SSL VPN over IPSec VPN; Differences between IPSec and SSL when it comes to controlling access back-end servers and other resources; Risks of SSL. INSETS: Should...

  • FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec. JEONG-BEOM KIM; MOONBAE SONG; CHONG-SUN HWANG; SANGKEUN LEE // Journal of Information Science & Engineering;Sep2008, Vol. 24 Issue 5, p1329 

    As a de facto standard protocol, Internet protocol security (IPSec) provides secure communication between networked systems. One of the most common issues today in large-scale virtual private networks using IPSec is the problem of a stale security association, which occurs when the device at one...

  • Performance Analysis of IP Security VPN.  // International Journal of Computer Applications;Oct2010, Vol. 8, p5 

    The article presents a performance analysis of Internet Protocol Security (IPSec) for Virtual Private Networks (VPNs) for real time videoconferencing. It presents a comparison of four different environments, including without IPSec, IPSec with Authentication Header (AH), IPSec encapsulating...

  • SSL: The next-generation VPN. Johnson, Johna Till // Network World;8/18/2003, Vol. 20 Issue 33, p25 

    Comments on the trend toward SSL computer network protocol-based virtual private network (VPN) services in the U.S. Advantage of SSL over IPSec; Benefits of SSL-based VPN.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics