To address this shortcoming, security teams often add point products, such as proxies, to handle traffic when users are disconnected from the VPN. Disconnected users present a security problem, however: Organizations lose visibility and control over user traffic. With applications moving to the cloud, users don’t need to connect as often to the remote access VPN. Why Companies Need to Move Beyond Remote Access VPN ![]() ![]() With remote access VPN, data can be transmitted without an organization having to worry about the communication being intercepted or tampered with. Remote users can securely access and use their organization’s network in much the same way as they would if they were physically in the office. This is because the traffic is encrypted, which makes it unintelligible to any eavesdropper. ![]() The remote access VPN does this by creating a tunnel between an organization’s network and a remote user that is “virtually private,” even though the user may be in a public location. A remote access virtual private network (VPN) enables users who are working remotely to securely access and use applications and data that reside in the corporate data center and headquarters, encrypting all traffic the users send and receive.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |