Archive for November, 2012

Over the past week, we’ve featured a series of installments that answer your questions about VPNs and DirectAccess. Of particular interest to you were the hardware requirements for DirectAccess, if DirectAccess supercedes VPNs, and what issues Microsoft could improve or optimize. Before releasing Part 4 of the series, we want to know: How often do […]

Over the past week, we’ve featured a series of installments that answer your questions about VPNs and DirectAccess. Of particular interest to you were the hardware requirements for DirectAccess, if DirectAccess supercedes VPNs, and what issues Microsoft could improve or optimize. Before releasing Part 4 of the series, we want to know: How often do […]

This is part three in a series of questions related to DirectAccess and VPNs. Earlier this week we addressed the hardware requirements with DirectAccess and whether DirectAccess, in combination with Windows 8, supersedes VPNs. Question: Its inflexible and complex implementation was one of the greatest weaknesses of DirectAccess in combination with Windows Server 2008 R2. […]

This is part two in a series of questions related to DirectAccess and VPNs. Last week, we addressed why VPNs are still necessary with Windows 8. Question: Does DirectAccess have any hardware requirements? Patrick Oliver Graf: While DirectAccess doesn’t require the Trusted Platform Module (TPM) – based virtual smart card capabilities in Windows Server 2012/Windows […]

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain Vulnerabilities Midsize Insider  – IT Security Threats: The Predictive Problem  SearchCloudApplications – Mobile cloud trends: Apps let enterprises handle the risks of cloud computing TabTimes – Study: Forget corporate deployments, BYOD will drive business adoption of Windows 8 tablets Share this:EmailFacebookPrint