Home > Articles > Building a Security Strategy

Building a Security Strategy

Chapter Description

Bob Vachon introduces network security-related concepts and summarizes how security policies are implemented using a lifecycle approach.

Secure Connectivity Through VPNs

There are two VPN-based solutions to implement secure connectivity:

Secure communications for remote access

Provides secure customizable access to corporate networks and applications by establishing an SSL or IPsec VPN tunnel between the remote host and central site

Secure communications for site-to-site connections

Provides secure site-to-site IPsec VPN access between two or more sites

6. Security Management | Next Section Previous Section

There are currently no related articles. Please check back later.