Editor's note: TechRepublic's free-with-membership articles, including these two from this content package—"Optimal VPN server security and management" and "Troubleshoot Windows RAS and VPN connections with these tips"—provide a good introduction to VPN topics.
Increasingly, business leaders are recognizing the benefits of providing authorized users with remote access to electronic data. However, as an IT professional, you know that the risks associated with transferring data across the Internet far outweigh the benefits of, say, being able to check e-mail from anywhere in the world. How do you reconcile the need to provide remote access to sensitive corporate data with the greater need to safeguard it?
The solution for many IT organizations is to create a secure tunnel for data transfer via a virtual private network (VPN). VPN technology lets users take advantage of high-speed Internet access without incurring the Internet’s attendant security risks. To more thoroughly understand the ins and outs of VPN implementation in today’s enterprise computing environments, look no further than TechRepublic's Administrator’s Guide to VPN and Remote Access, Second Edition.
You'll find expert information and advice to help you:
- Determine how to provide remote access without compromising data security.
- Set up and administer VPNs within Windows, NetWare, and Linux networks.
- Configure VPN connections with firewalls.
- Troubleshoot TCP/IP and other data-transfer protocol issues.
- Identify and evaluate a wide range of remote access solutions.
As an added bonus, the searchable CD-ROM includes a special chapter of case studies by in-the-trenches IT professionals, including two pieces on TechRepublic’s own VPN implementation.
Buy our Administrator's Guide to VPN and Remote Access, Second Edition, for an in-depth look at VPN implementation advice.