VPNs and remote access

Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, guest instructor Lisa Phifer, owner of consulting firm Core Competence, teaches you about the latest innovations in VPN technology, IPsec VPN identity and authentication options, and secure VPN deployment strategies.

Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, guest instructor Lisa Phifer, owner of consulting firm Core Competence, teaches you about the latest innovations in VPN technology, IPsec VPN identity and authentication options, and secure VPN deployment strategies.

   Webcast: Guarding the gate: VPN deployment strategies    Technical article: Understanding IPsec identity and

authentication options    Podcast: The road ahead: Emerging VPN trends    Quiz    About the instructor

MAIN MENU
IAM Security School Home
Endpoint security
VPNs and remote access
Automated provisioning
Building an IAM architecture
Authentication
Integrating security into the network


 

Webcast: Guarding the gate: VPN deployment strategies
Length: 60 minutes
In this webcast, Phifer explains what it takes to deploy a VPN that meets workforce needs without unacceptable limitations or risk. Learn strategies that can help your organization satisfy VPN client-side requirements on remote user devices, support target applications and policies by applying the right VPN tools, integrate VPN authentication with existing network services and identities, and more.

 

Technical article: Understanding IPsec identity and authentication options
IPsec VPNs extend a network's security perimeter by connecting individual hosts or entire networks. Preventing unauthorized access starts with verifying the identity of those VPN tunnel endpoints. Using the wrong authentication method can lead to interoperability issues or network compromise. In this article, Phifer explores the IPsec VPN identity and authentication options supported by the Internet Key Exchange standard, as well as common vendor extensions like Extended Authentication.

 

Podcast: The road ahead: Emerging VPN trends
Length: 10 minutes
New network technologies and expanding mobile workforces have changed the VPN landscape. In this podcast, Phifer explores emerging techniques intended to reduce cost of operation, strengthen security and deliver secure access to additional users. Learn about the latest innovations, from clientless VPNs to managed VPN services, and what you can expect to see in the future.

 

Quiz
Take this five-question quiz to see how much you've learned about VPNs and remote access.

About the instructor
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.
This was first published in September 2008

Dig deeper on User passwords and network permissions

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close