Overview of SSL VPN : Understanding, evaluating and planning secure, web-based remote access
Understand how SSL VPN technology works
Evaluate how SSL VPN could fit into your organisation?s security strategy
Practical advice on educating users, integrating legacy systems, and eliminating security loopholes
Written by experienced SSL VPN and data security professionals
Buy 'SSL VPN : Understanding, evaluating and planning secure, web-based remote access' with 'OpenVPN 2 Cookbook' and get 50% off both the eBooks. Just add both the eBooks to your shopping cart and enter 'dsvpn5ecb' in the 'Enter Promotion Code' field. Click 'Add Promoitonal Code' and the discount will be applied.
Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the purpose.
Clientless SSL VPNs avoid the need for client machines to be specially configured. Any computer with a Web browser can access SSL VPN systems. This has several benefits:
Low admin costs, no remote configuration
Users can safely access the company network from any machine, be that a public workstation, a palmtop or mobile phone
By pass ISP restrictions on custom VPNs by using standard technologies
SSL VPN is usually provided by a hardware appliance that forms part of the company network. These appliances act as gateways, providing internal services such as file shares, email servers, and applications in a web based format encrypted using SSL. Existing players and new entrants, such as Nokia, Netilla, Symantec, Whale Communications, and NetScreen technologies, are rushing our SSL VPN products to meet growing demand.
This book provides a detailed technical and business introduction to SSL VPN. It explains how SSL VPN devices work along with their benefits and pitfalls. As well as covering SSL VPN technologies, the book also looks at how to authenticate and educate users ? a vital element in ensuring that the security of remote locations is not compromised. The book also looks at strategies for making legacy applications accessible via the SSL VPN.
This book is a business and technical overview of SSL VPN technology in a highly readable style. It provides a vendor-neutral introduction to SSL VPN technology for system architects, analysts and managers engaged in evaluating and planning an SSL VPN implementation.
Visit the Free Online Edition for SSL VPN and learn more about the book, you can read through a full chapter, "How SSL VPNs Work", and discover what each chapter from this book has in store.