Secure Network Infrastructures example essay topic

367 words
The real driving force for remote access came with the appearance of VPNs, which allow remote access to take full advantage of the Internet by ensuring safe connections (security being of paramount importance) to private networks over the public infrastructure. This has made it possible for companies to implement remote access without the investment in often expensive RAS equipment. "The majority of corporate's now have Internet connectivity and so with the arrival of VPNs, it makes sense to take advantage of the existing infrastructure. Savings can also be made on the client side, as users can now dial directly into their local ISP PoP (point of presence) instead of perhaps having to make a national call". ("Remote access buyers' guide - Distant connections", Network News, 1999) A new type of remote access solutions called SSL VPN is changing the way remote access is achieved. Combining existing technology and protocols (TCP / IP and Secure Sockets Layer (SSL) ), "an SSL VPN off-loads secure processing and management of remote connections from the subscribing client and corporate server to a dedicated security appliance that typically resides between the firewall and application server.

Connecting from whatever device is available, for example a laptop computer, trade show kiosk, or PDA, a user can access applications that are enabled on the network using a standard browser. Unlike traditional VPN systems, Sure Ware Agate does not require any modification to internal Web applications or servers. Furthermore, being platform and application independent, Sure Ware A-Gate can publish multiple applications running on multiple diverse platforms". ("Enabling Low-Cost Secure Access for Everyone. A Business and Technology Review of Secure Remote Access using an SSL VPN Appliance", 2004) There are so many threats, risks and challenges in business networking that organizations should take a systematic, thorough approach to planning and deploying secure network infrastructures.

When developing their network architecture, each area of the network should be carefully evaluated, potential threats should be found out, and appropriate security measures should be implemented. By developing an appropriate security policy, companies can move forward confidently to implement their network solutions and enjoy the many benefits of the Internet.