Chapter 7
Securing Data in Transit with VPNs
In This Chapter
Understanding the differences between IPSec and SSL VPNs
Identifying and authorizing users
Determining access privileges by device profile
Knowing what applications users want to access
Limiting access to required data and applications
If your organization is like countless others that we’ve worked with, you’ve spent a great deal of time and money over the past several years developing policies and implementing solutions to allow for secure remote access. The ability to work remotely while retaining access to corporate applications has changed when and where people work, resulting in untold productivity gains for everyone from traveling employees (such as executives and salespeople) to folks looking to squeeze a bit more work from their day in the evenings and weekends.
As time has progressed, you’ve no doubt built the infrastructure that allows these levels of productivity, without sacrificing security. The cornerstone ...