These days, the outlook for enterprise networks with a mission to safeguard corporate data is getting brighter. Weapons such as firewalls; VPNs; and increasingly sophisticated authentication, authorization, and encryption techniques (and more resistant public and private keys) are becoming more widely . . .
These days, the outlook for enterprise networks with a mission to safeguard corporate data is getting brighter. Weapons such as firewalls; VPNs; and increasingly sophisticated authentication, authorization, and encryption techniques (and more resistant public and private keys) are becoming more widely available to organizations of all sizes. For example, instead of relying solely on a single, centralized firewall, companies can more easily expand their perimeters via desktop or personal firewalls. And those who are outsourcing this function should take it upon themselves to closely scrutinize what lies in their service provider's arsenal.

The same holds true for VPNs. While some organizations have the resources and manpower to handle these in-house, many are turning to alliances with service providers to help secure this perimeter. But first, it's crucial to determine whether your service provider can supply the type of VPN you need, how quickly they can provide it, and, in the case of "New Age" providers, whether they'll be able to stay in the battle for the long haul.

The link for this article located at Network Magazine is no longer available.