This resource is no longer available

Road Rules: Emerging Techniques for Secure Remote Access


Early VPN concentrators effectively enabled trusted laptops to gain access over the Internet. But they made assumptions about remote devices and users that have proven untenable in today's increasingly mobile and diverse business environment. To successfully battle the escalating threat landscape and comply with privacy regulations, companies can no longer afford VPNs that open gaping holes into their network.

This webcast details emerging approaches to secure remote access that can be used to complement or even replace conventional VPN concentrators and covers the advantages and disadvantages of more contemporary secure remote access methods.

Check out this featured webcast and learn more about:

  • New business drivers that are reshaping secure remote access
  • The continuing evolution of SSL VPNs - why one size does NOT fit all
  • Keeping nomadic workforces productive with Mobile VPNs
  • VPN alternatives - secure application portals, secure desktop access
  • Limiting risk exposure through identity and role-based access control
  • Stopping breaches before they start with NAC and endpoint security


Lisa Phifer President, Core Competence Inc.

Session 3: Diverse Mobile Platforms, Complicated Security

Session 4: Safeguarding Mobile Applications

Lisa Phifer has been involved in the design, implementation, and evaluation of networking, security, and management products for over 25 years. Since joining Core Competence in 1995, she has advised companies large and small regarding security needs, product assessment, and the use of emerging technologies and best practices. Lisa teaches about wireless LANs and mobile device security and management, and has written extensively for numerous publications, such as enterpriseNetworkingPlanet, Information Security Magazine, SearchMobileComputing, SearchSecurity, and more.

Nov 28, 2007, 12:00 EST (17:00 GMT)

This resource is no longer available.