Chapter 11

Securing Remote Clients

Introduction

If your organization is interested in using a VPN client, but you are concerned about allowing clients’ personal computers into your network when you have no control over what they are running on their PCs, then Check Point solves this problem by giving you control of your remote users’ desktop security. You can configure specific properties for your mobile users’ desktops, which could include prohibiting connections to their PC when they have the remote software running. That way, ...

Get Checkpoint Next Generation Security Administration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.