I'm not sure if the invention of the smartphone has been a blessing for humanity, but it has definitely look us made like robots that are still stuck on it.
the device prevalence given today, the age-old practice is no longer "to leave your work at the office" holds water. In the late 80s and early 0s, when I was a child, to check my parents never registered to their office network to emails or harassed a call from work to answer if they were at home or away on vacation. The work was confined to the office ... but those were the "good old days" and are gone for good or for bad long.
Times have changed. Part of the beauty of the art is, however, that it changes with time. Company began expanding, 1 employees was 11 and they were multiplied and it came to connect all offices a need. IPSec-based VPN was born from such a need. The times changed again and improves the technology and came SSL VPN-based VPNs.
time on and with her change marches in lockstep march ahead. So what's next?
we take a brief look at each of these technologies and to understand what the drivers back in were "day", and what are the drivers today the change in remote access are driving environment.
IPSec VPN
IP Security (IPSec) VPN is a legacy VPN solution that combines corporate devices to trusted networks. IPSec was originally developed to connect two wired networks and made available to expand the infrastructure for a private network over the Internet to reach a Virtual Private Network (VPN) to build and partners, customers, etc..
There is likely to be adopted, the solution for data security during transport most; However, it is not well suited for use in mobile and wireless networks. An IPSec tunnel is required that the IP addresses of the two end points remain unchanged. Some of the disadvantages of using an IPSec VPN solution are as follows:
- IPSec is not the most reliable connection when the user is mobile and expose from one network to another and / or and laptop back absorb compounds. Users must authenticate again when they occur a gap in the compound and that user frustration result, loss of user productivity and high volume calls to the support desk.
- IPSec nor any kind of optimization allows application traffic if it is delivered to an end user device such as mobile phone.
- Does not allow administrators granular application-level policies, apply and, therefore, an IPSec VPN appliance can not be used as a centralized policy manager.
SSL VPN
SSL VPN is a secure way of data remotely access application. How to IPSec VPNs over that connect to trusted networks Corporate devices, SSL VPNs connect users with any browser-enabled device to specific applications. It's good for BYOD (laptops and desktops) and users suitable applications accessible from home, in a café or any remote location.
SSL VPN met most of the applications for remote workers but falls short of meeting requirements of a mobile user. Similar to IPSec VPN, SSL VPN also has some disadvantages:
- SSL VPN solutions such as IPSec VPNs, not circumvent user roaming between networks very well. In case of poor connection will crash applications or lost data.
- SSL VPN is a layer 7 usually a TCP connection, rather than a UDP connection. This results in lower wireless network performance
Mobile VPN
access with end users more and more on their smartphones and tablets to leave emails to company data how, business and cloud applications, companies will improve security for these devices, called into question. If you throw in BYOD, the challenges even more complex
question is on your mind. Why not? Companies can use the existing infrastructure such as SSL VPN or IPSec use secure access from mobile phones to force
simply can not. Traditional VPNs are not only built for the mobile environment. Although these technologies for the users great job connecting from a stationary device such as a PC via a LAN connection in the office or a laptop through a residential broadband connection, they can do the same for devices that do not, the mobile and are not stationary. A traditional VPN can not adjust to the device in motion and the properties such as IP address, location of the power connector, which varies with the movement. As a result, users can obtain high drop rates, poor connectivity and constantly need the devices again. This leads to a loss of productivity and increase of frustration.
In addition, the mobile telephones can use the mobile networks which have low throughput and higher packet loss as compared to a cable connection. The user accesses applications from a mobile device are typically written them for stable cable connections have a high throughput. This results in poor application performance and lost productivity for the mobile user.
Mobile VPN is built the same SSL VPN technology but has added a traditional SSL VPN solution and specifically for a mobile user characteristics. Optimizing the mobile app traffic, integration with MDM / MAM products safety and compliance to offer, providing SSL VPN tunnel and per App Tunnel on mobile devices and so some of the features that come with a traditional SSL VPN solution not provided.
Now before you is the dilemma: "I have used products from several point in my data center for each of the above cases, my users have to access applications remotely to go multiple URLs with. the user experience frustrated Several solutions for remote access are the cost of the trip to the top and has resulted in my data center redundancy What should I do "
the answer is simple:.. A URL. IT needs to start consolidation and remote access infrastructure converge. We must look for solutions to start that provide secure remote access to any application available on any device.
Voted For more information on a URL and how it drives consolidation, stay for our next post. To be continued ...
0 Komentar