Quantcast
Viewing all articles
Browse latest Browse all 10

VPN UTM businessman comparison: Evaluating secure remote entrance features

Unified
threat government appliances
are elaborating to embody practical private networking (

    Image may be NSFW.
    Clik here to view.

    SearchEnterpriseWAN.com members benefit evident and total entrance to violation attention news, best practices for conceptualizing and handling Wide Area Networks, WAN Security, and some-more — all during no cost. Join me on SearchEnterpriseWAN.com today!

    Kate Gerwig, Editorial Director

Image may be NSFW.
Clik here to view.

VPN)
support. The essay next compares several VPN
UTMvendor
capabilities.

What UTM appliances need today: VPNs for remote access

Today, an increasingly mobile and different workforce is straining during network bounds inside
organizations of all scales. In particular, telecommuting and remote entrance divided from home and
office — be it on a road, in a air, during a customer’s or client’s site, or all points in-between
– are forcing organizations to take special caring in vetting and safeguarding remote access. IT must
check and conduct clients before users are authorised inside network boundaries. In addition,
enterprises contingency understanding with move your possess device (BYOD)
where employees wish to use their mobile handsets, tablets and PCs in a workplace, even if it’s
just to benefit entrance to an Internet connection.

For a best insurance in such situations, many organizations of all beam — from small
businesses to a largest of enterprises — are deploying unified
threat management
, or UTM, solutions on their network boundaries, and in their bend and
satellite offices. UTM not usually provides powerful, mainly managed confidence coverage, but
upgradable firmware and program that permits these inclination to keep adult with an ever-changing threat
landscape, yet requiring indiscriminate hardware upgrades or replacements.

In particular, UTM inclination contingency support a following VPN technologies and facilities to offer the
most extensive forms of network confidence coverage and protection:

  • VPN support for a Secure Sockets Layer (SSL)
    and Transport Layer Security (TLS)
    is increasingly essential, not only since it provides clever encryption for all kinds of
    networked applications yet since it also provides integrated confidence for Web browsers –
    especially for mobile inclination such as smartphones and tablets. In short, any device with a modern
    Web browser can support a reasonably-secure VPN link. As of mid-2012, all stream browsers support
    SSL and a infancy also support TLS adult to 1.1, with some uneven 1.2 support.
  • A VPN-capable UTM device contingency have a ability to check real-time HTTP and
    HTTPS traffic, so as to be means to heed among Web-based applications all pity Port 80 (HTTP) and 443
    (HTTPS) to filter use and entrance on an focus basis, as good as on a calm basis.
  • VPN UTMs contingency have a ability to check encrypted information streams regulating SSL, TLS,
    Secure Shell (SSH), and so
    forth. This also lets UTM inclination find and retard threats inside ambiguous information streams that might
    otherwise go by a firewall unhindered and unheeded. This kind of record also provides
    important support for information steam prevention, and lets classification retard or concede record transfers
    on a basement of process or content, irrespective of encryption. For regulatory compliance,
    protection of information resources and egghead property, and insurance of confidentiality, such
    functionality is positively essential in a ever-more-mobile networking world.
  • In further to ancillary remote entrance around a VPN (through SSL-TLS, IPsec, and in some cases,
    PPTP,
    L2TP,
    and L2TP
    over IPsec
    ), UTM inclination contingency also establish tunnels for site-to-site access. Nearly all
    VPN UTM vendors support elementary point-to-point (P2P)
    tunnels, yet many also support hub-and-spoke (HS) tunneling, and some even support partial-mesh (PM) or
    full-mesh (FM) tunneling topologies. Hub-and-spoke is important, for example, for
    organizations with countless bend or satellite offices, all of that need entrance to a heart at
    headquarters or some executive location. Mobile VPNs embody remote entrance capabilities, along with
    SSL or TLS Web-based VPN support, while UTM products inventory “remote entrance features” prove no
    mobile VPN support is available.

A VPN UTM underline businessman comparison

In looking during heading UTM vendors, we celebrated an engaging product pattern for these and
related facilities in several VPN UTM devices, as Table 1 shows.

Table 1: VPN UTM businessman offerings by protocols, gateways, and inspection

Table key: SSL-TLS: Secure Sockets Layer-Transport Layer Security; IPsec:
IP Security; L2TP: Layer 2 Tunneling Protocol; P2P: Site-to-site tunneling support;
HS: Hub and spoke tunneling support; F/PM: full filigree and prejudiced filigree support;
… (Ellipsis): additional options also available

Selecting a VPN UTM vendor

Most of a UTM
vendors
are on standard with one another, yet there are a vast series of options accessible for
UTM inclination that scale from 10 users and VPN connectors per device during a low finish (aimed primarily
at tiny businesses) to 2,000 to 6,000 VPN connectors per device (aimed essentially during information centers
or during corporate hub/HQ operations). Consequently, pricing ranges from underneath $1,000 for low-end
devices to over $100,000 for high-speed, high-capacity devices.

Most organizations will find that their existent height and businessman allegiances will guide
their choices for VPN UTM technology. But where businessman faithfulness doesn’t make choices obvious,
interoperability with other infrastructure and confidence elements will be of peerless concern. I’ve
had really good fitness with a Fortinet, Astaro and SonicWALL deployments I’ve been concerned in, but
all a other vendors in Table 1 have glorious products and reputations to match.

As your classification prepares to broach nonstop remote entrance to a users and gets prepared to
add mobile inclination to a mix, don’t forget a significance of SSL-TLS VPN support. Even vendors in
Table 1 that don’t support such capability during a impulse will expected supplement it someday in a near
future. It’s an critical pivotal to simple, candid VPN entrance for all users, no matter what
kind of UTM apparatus device they wish to use.

Ed Tittel is a unchanging blogger for and writer to countless TechTarget websites. His
latest e-book in this area is called
Unified Threat Management (UTM) For Dummies. He has also
written countless other confidence titles on malware and information confidence certifications. Visit
his webpage during
http://www.edtittel.com/.



This was initial published in Jun 2012

Article source: http://www.pheedcontent.com/click.phdo?i=55119666c140ebe632dbfa1bd3f720a5


Viewing all articles
Browse latest Browse all 10

Trending Articles