IPSEC VS. VPN: Transition Criteria and Methodology

IPSEC VS. VPN: Transition Criteria and Methodology

In this white paper, you will learn how to assess your VPN needs, identify the limitations and optimal uses of IPSec, understand the benefits of an SSL VPN, consider key remote access configuration variables and examine the particular use cases in which you might keep IPSec. You will also discover how to evaluate SSL VPN solutions and what crucial features and benefits you will need to compare. You will also review alternative deployment scenarios and learn best practices on how to implement a staged VPN replacement, including the best-practice transition methodology and the impact upon administrators and end-users.Finally, you will receive first-hand insights from a real-world replacement.
15 Nov 2007
01 Nov 2007
13 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor