Date Added: Sep 2009
In today's interconnected and dynamic workplace, organizations rely on a large part of their workforce working remotely from corporate offices. This creates a situation where networks are driven by computing assets flowing in and out of network perimeters, with the need to provide remote assets access to the internal network. Such fluidity in computing assets has rendered perimeter-based security solutions inadequate in protecting all aspects of computing activities. Remote and mobile users require multiple access and configuration profiles to fulfill their job duties. For example, providing access to email or sales force applications from hotel rooms, airports, or customer offices. Another remote worker profile is that of the telecommuter working from home.