Juniper Networks MAG Series appliances provide a suite of enterprise remote access services in a consolidated, secure and scalable platform. For many the use case for remote access has moved from laptops to App driven access from Smart devices. Beyond connectivity for the traditional Road Warrior/Fat client; there are plenty of use-cases for SSL VPNs. In its purest form, a SSL VPN uses the encryption features built into the web browser to secure communication between the remote clients and back-end resources. Authentication is performed over the encrypted SSL connection and the user is then authorised to access specific resources in line with the corporate security policy.Read more...
Let’s face it; reality today is the majority of us have a mobile device – typically a smartphone, or even a tablet.
Plus, we all use our mobile devices to access and store “data”. The problem is what typically is this “data”?
Most of us think of “data” as something really important and critical, like a bank account, debit card or credit card numbers and other information of this nature. Also, often times when we hear “data”, we think of work-related stuff, such as sensitive e-mails and attachments, secret plans or programs, or maybe even ultra-sensitive information like intellectual property that could mean disaster if it fell into the “wrong hands,” such as a competitor.
Yes, all of that information, which can be accessed, downloaded, transmitted and stored on our mobile devices, is data but so are online banking and social networking account user names and passwords, or our corporate or e-mail access user names and passwords for which we leverage the auto-complete function on our mobile devices. Some of us even access, download and store sensitive medical or prescription records on our smartphones or tablets. Even pictures of our families can be sensitive data, not to mention private emails to or from our personal email accounts.Read more...
Discussing a wide range of topics impacting enterprises and
data center security.