Top VPN Questions Answered

Rainer Enders, CTO Americas, NCP engineering

by VPNHaus | 12/27/2011 |Industry Commentary

*Editor’s Note: This questions originally appeared in TechTarget’s SearchEnterpriseWan

By Rainer Enders, CTO of Americas for NCP engineering

Why should you monitor your Internet VPN?

Monitoring your Internet VPN is essential for assessing the health of your enterprise wide area network (WAN) and collecting vital statistics for planning and maintenance purposes. It helps identify early signs of improper or inaccurate use.

This will allow enterprise IT or network security staff to take proactive measures to avoid major incidents in the first place. Monitoring your VPN also helps to identify and track malicious activities on the network. When incidents occur, data collected from monitoring events will help you analyze the ongoing problem and can assist in future incident response, analysis and potential prosecution.

Can cloud VPNs completely secure network traffic?

Complete security does not exist, cloud or no-cloud. However, there are specific cloud computing security-related and service-related considerations that must be addressed. An interesting question in cloud environments is the necessity of a network perimeter. Whereas servers and virtual machines can be secured tightly with a traditional perimeter, cloud VPNs may need a perimeter firewall in addition to the device and server firewalls which can be provided by the operating system and additional security software. Additionally, a network perimeter in the form of a UTM firewall may be particularly useful for enterprises which have a variety of networked devices that need to be protected. For other environments though, managing the devices, end-user access and central administrative control are critical to ensuring cloud VPN security.

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK