John Girard Bill Clark Gartner Webinar SSL VPN - A Lightweight Alternative To IPSEC These materials can be reproduced only with Gartner’s official approval.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Remote Networking Architectures
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Intranet Steve Andy Michael. Intranet A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible.
More Power Out: Empowering your mobile workforce Damir Bersinic IT Pro Advisor Microsoft Canada Rick.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Defining Network Infrastructure and Network Security Lesson 8.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Virtual Private Network Access for Remote Networks
Barracuda SSL VPN 2012.
Network Security Solution
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network
Barracuda Firewall The Next-Generation Firewall for Everyone
Virtual Private Networks
Remote Access Lecture 2.
Forefront Security ISA
Virtual Private Networks (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network
Implementing Client Security on Windows 2000 and Windows XP Level 150
Cengage Learning: Computer Networking from LANs to WANs
Designing IIS Security (IIS – Internet Information Service)
Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

John Girard Bill Clark Gartner Webinar SSL VPN - A Lightweight Alternative To IPSEC These materials can be reproduced only with Gartner’s official approval. Approvals may be requested via to

© 2003 FULL VPN (IPSEC, PPTP, L2TP): AAA & DS integration at the workstation Expanded network, security and help desk training Distributed policy management console Session diagnostic tools for access and applications VPN clients for multiple platforms and OS note: proprietary clients work best Registry, policy & boot locks are recommended Personal firewall & antivirus SOHO security appliances (strongly recommended) Session disruption problems Personal PC/device liability/exposure plan. FULL VPN Checklist: It’s So Simple?

© 2003 A Full VPN Is A Network Connection

© 2003 A Full VPN Is A Network Connection DMZ Proxies Filters Policies

© 2003 The Joy of SSL IPSec Virtual Private Networks provide heavyweight tunnels from internal networks to external computers Secure Sockets Layer provides a lightweight way to transfer data between internal servers and external computers Sun, Novell, Aventail, OpenReach, Neoteris, others provide ways to access file/print services over SSL TLS, the upgrade to SSL, includes stronger encryption Why take the risk of opening a tunnel to the outside world? VS

© 2003 SSL VPN: Does the client have a browser? Yes. Next question? AAA & DS integration operate at the server/gateway Session diagnostics are server/gateway based Access control is menu-driven, granular by resource Most NAT, IP Address sharing issues are moot Session can survive an interrupted connection Maximum portability Better solution for “home PC” access and extranet/contractor access There will be times when “full VPN” users will want SSL access. SSL VPN Is Simple(r)

© 2003 SSL: Application or Network Access Private WEB access Private access for a designated C/S application Full network access for a designated workstation

© 2003 SSL VPN Best Practices: Network tunnels should only opened to company managed devices The session still needs to be firewalled! Apply cleanup scripts and applet firewalls Limit what users can see based UserID and Group Policy Track visited intranet links (what, who, when) Detect the type of device and type of network requesting the connection. If you don’t recognize them, place additional limits what the user can see Simpler, Not Foolproof

© 2003 Execution Criteria Visible in the competitive landscape as a brand name and as a solution, validated from independent sources Mind share and industry influence to capture business Request-for-proposal flexibility and competence Gartner client awareness and performance Business health Vision Criteria Ability to adopt longer-term values and cause changes in prevailing industry trends by its actions Mind share and industry influence to set directions Breadth of solution Enterprise focus/message based Value-added services Market Evaluation Criteria

© H2003 Magic Quadrant Neoteris Aventail Aspelle OpenReach Lemon Planet URoam Citrix Nortel Info Express Seagull Tarantella Whale Netilla Array Vision Execution

© Forecast site to site IPSEC (not individual remote access) individual IPSEC/PPTP individual SSL/HTTPS

© 2003 Questions?