The popular image of the corporate firewall is a “gatehouse” guarding the corporate network, which implies a single security domain.
Today’s corporate security realities however, are far more subtle. Once past the gatehouse, organizations are far from monolithic security
domains populated by indistinguishable individuals. Organizations have contractors, joint ventures, transient technicians, special access projects,
and others; each with their own needs (and limitations) for Internet and Intranet access.
The challenge is providing each of the many constituencies with secure access while accommodating their inevitably conflicting rights,
responsibilities and needs. In short, an organization must ensure regulatory conformance while still allowing staff, salesman,
and contractors access to their systems as needed.
We will examine the needs of typical constituencies, requirements, and how they can be addressed while maintaining
ease of use and its attendant reduction in Total Cost of Ownership (TCO). Technologies examined will include firewalls,
VPNs, proxy servers, authentication, and WiFi.
|
Questions to:
webmaster@removethis.rlgsc.com