In This Month's Security Buyer, Craig Kennedy Explores Different Types of VPN

Security Buyer, March 2016:VPN image sq
In this month's edition, Craig Kennedy filled the Ask the Expert slot to explore virtual private networks and look at the choice between IPsec and SSL-based VPNs

As network providers deliver progressively greater bandwidths, and as ADSL, cable internet and wireless access technologies have become widely available, a growing number of security networks are taking advantage of public infrastructure. By adopting ADSL or 3G/4G as the transmission medium over the internet, instead of leased lines or dedicated circuits, end users can procure more flexible, IP-based systems with significantly lower operational costs. However, by its very nature, public infrastructure is insecure and poses a threat to the integrity of the video, voice and data streams it carries.

Currently, the most accepted method to protect data over a WAN is to build a Virtual Private Network (VPN). Essentially, a VPN extends a private network across a public network. It enables data to be sent across shared infrastructure but operates as if the devices were connected to a single, private network, thus keeping the data secure. The two commonly used technologies to provide this capability are: Internet Protocol
Security (IPsec) and Secure Socket Layer (SSL). Both employ standards-based encryption and authentication techniques to provide end-to-end security over IP networks, however, the technologies operate in very different ways...View the article online


Download the article:

{jd_file file==1396}