Services: Remote Access Security Architecture
Remote access for vendors and employees often creates one of the most significant vulnerabilities in an
organizationís network perimeter. Remote access is quickly becoming common place and is most often required
by those with access to an organizations most sensitive systems and data.
Many solutions exist for remote access and they can be configured to provide moderate security; however, given the
information and systems that are being accessed, many organizations have not properly balanced their risk
equations. Simple encryption and even encrypted tunnels are usually inadequate for most applications.
Network routing controls, two-factor authentication, split tunneling restrictions, protection of the internal
network from remote access points, and remote user policies and procedures all need to be considered.
Internet Vulnerability Assessment
Network Penetration Testing
Security Policy, Process, and Procedure Review
Design and Implementation
Secure Remote Access Infrastructure
Intrusion Detection System (IDS)
Secure Wireless Networking
Privacy of Personal Information
Awareness and Education
Management and Staff Awareness
IT Staff Security Administration Training
[Back to Top]