Posts of category: SSL

Rethink Remote Access·SSL·Troubleshoot·VPN

Hotel VPNs: When the firewall strikes back, Part Two

In part one of this two-part series, we explored the problem that many IPsec users face when trying to connect to their corporate network from the road, especially hotels. This being, some hotels…

Industry Commentary·IPsec·Mobile·SSL·VPN

Hotel VPNs: When the firewall strikes back, Part One

Not so long ago, business travelers could only access the Internet through a telephone line and a notebook modem in a hotel. Today, Internet access has become not only ubiquitous, but also fast and…

Mobile·Rethink Remote Access·SSL

Automated Mobile Security, Part 4

The following is the fourth, and final, post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide…

ESUKOM graphic
Mobile·Rethink Remote Access·SSL

Automated Mobile Security, Part 3

The following is the third post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated…

Mobile·Rethink Remote Access·SSL

Automated Mobile Security, Part 2

The following is the second post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated…

msp[1]
Industry Commentary·SSL·VPN·Windows

The Benefits and Pitfalls of Using Sandboxing Techniques in SSL VPN, Part 2

*Editor's Note: This is the second post in a two-part series. 

Industry Commentary·Mobile·SSL

The Benefits and Pitfalls of Using Sandboxing Techniques in SSL VPN, Part 1

By Dr. Matthias St. Pierre, Senior Developer at NCP engineering

Industry Commentary·Mobile·Rethink Remote Access·SSL

From the Trenches: Worst IT Mistakes, Part 2

By Chuck Romano

rainers_enders-150x150
Shows·SSL

Less is More: Why SSL VPN is NOT What You Think It Is – #Interop

*Editor's Note: This post is syndicated from the Interop Blog.You can see the original post by clicking here. 

remote-desktop-software-security
IT policy·Mobile·Rethink Remote Access·SSL

The Security of Remote Desktops

Lately, we've been getting a lot of questions about the security of remote desktop applications like LogMeIn, so here's our take on this. More than 20 million people are registered on LogMeIn and are…