Chapter 7

Securing Data in Transit with VPNs

In This Chapter

arrow Understanding the differences between IPSec and SSL VPNs

arrow Identifying and authorizing users

arrow Determining access privileges by device profile

arrow Knowing what applications users want to access

arrow Limiting access to required data and applications

If your organization is like countless others that we’ve worked with, you’ve spent a great deal of time and money over the past several years developing policies and implementing solutions to allow for secure remote access. The ability to work remotely while retaining access to corporate applications has changed when and where people work, resulting in untold productivity gains for everyone from traveling employees (such as executives and salespeople) to folks looking to squeeze a bit more work from their day in the evenings and weekends.

As time has progressed, you’ve no doubt built the infrastructure that allows these levels of productivity, without sacrificing security. The cornerstone ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.