Case Studies and Examples

There are various methods for proving the identity of, authenticating, authorizing, and auditing remote access users. The following case studies help you learn how some of these tactics are used in the real world to ensure the communications are secure and the access granted does not compromise the organization.

Private Sector Case Study

Many companies are contemplating the use of VPN versus authentication to applications via the web. The Miller Corporation is no different. Miller Corporation is a small organization with five sales representatives located throughout the United States. There are no remote offices available for the sales reps. Four of the five sales reps work exclusively from home or on the road. ...

Get Access Control and Identity Management, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.