VPN for VIPs

January 2006
Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p20
Trade Publication
The article discusses the importance of network security adopted by Product Action, a quality control vendor based in Indianapolis, Indiana. A secured facility, including the anonymity of their clients is important to them. Thus, door controllers and access control software from Kantech Systems were installed, integrated into a centralized access control. All locations connect through the virtual private network to enable secured communication from each facility to the corporate office. INSET: Smart Badges for 'Ultra-security'..


Related Articles

  • PROVIDERS TO INVEST HEAVILY IN VPN SERVICES.  // Computer Security Update;Jun2004, p4 

    Service providers in North America, Europe, and Asia plan to invest heavily in Virtual Private Network (VPNs) over the next year, and many will also invest significantly in intrusion prevention and next-generation firewall technology, according to a new study released by Infonetics Research,...

  • Virtual Private Networks - Based Home System. Volner, R.; Smrž, V. // Electronics & Electrical Engineering;2009, Issue 96, p62 

    The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web...

  • Today's Hybrid IP--VPN Market. Cochran, Rosemary; Dunne, Erin // Business Communications Review;Oct2004, Vol. 34 Issue 10, p12 

    This article reports that a customer converted a 50-site network to an IP-VPN and reduced network costs by 90 percent. Cost is overwhelmingly the primary purchase driver for customers buying IP-VPNs, according to our ongoing discussions with enterprise customers. As happy as they are to save...

  • Secure network links up 45,000 staff for Amec. Millman, René // SC Magazine: For IT Security Professionals (UK Edition);Jan2004, p14 

    Discusses the use of security sockets layer virtual private networks (SSL VPN) by Amec, an international engineering firm. Benefits of SSL VPN to the company and its employees and clients; Number of remote users of Amec worldwide; Integration of SSL VPN with Microsoft Exchange 2000 and Outlook...

  • Positive Identification in a Wireless World. Ardoin, Paul // Database & Network Journal;Feb2003, Vol. 33 Issue 1, p9 

    Discusses the significance of implementing security features that include access control appliances or virtual private networks to protect wireless systems instead of wireless encryption to establish a secure session. Vulnerability of the fixed passwords to inherent attacks by brute-force...

  • Economic downturn a catalyst for telecommuting -- and security breaches.  // NetworkWorld Asia;Jun/Jul2009, Vol. 5 Issue 3, p26 

    The article focuses on the benefits and threats of telecommuting on organizations in Asia. It cites that telecommuting has been helpful in increasing employee productivity, profitability and effectiveness. However, it emphasizes the need for businesses to consider the threat of telecommuting on...

  • A SCALABLE, SECURE AND USER-FRIENDLY VPN-BASED WIRELESS LAN ROAMING SYSTEM. Goto, Hideaki; Saito, Takayuki; Sone, Hideaki // Proceedings of the IADIS International Conference on WWW/Interne;Nov2009, p273 

    Network security and usability are both very important factors in campus Wireless LAN (WLAN) systems. Although IEEE802.1X-based user authentication is very useful for WLAN roaming, it imposes some security threats on the local area networks at visited organizations unless another countermeasure...

  • Scan your network for hackers.  // Techlife Australia (Bauer Media Group);Jun2014, Issue 25, p29 

    The article offers the author's insights on Nessus software, which is used to assess the security of the networks, from Tenable Network Security. Topics discussed include the Nessus Server Manager window will enable the rest of its buttons and permit user to control the background server...

  • Firms protect networks via remote control. Quittner, Jeremy // Crain's New York Business;3/15/2004, Vol. 20 Issue 11, p20 

    For years, information professionals have been busy building a network system that prevents the outside world from accessing important internal data and networks. Many off-site employees complained that these fortifications are denying their access to critical data. The solution of this problem...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics