Archive for the ‘SSL’ Category

By Bernd Reder

As the workforce becomes increasingly mobile, the methods by which users access critical business tools must evolve in kind. In the past, the desktop environment and all of the resources it hosted were only accessible if an individual was sitting right in front of his or her computer. But now, with the advent of laptops, tablets and smartphones, we’re seeing a paradigm shift—one in which digital assets are no longer imprisoned by local hard drives.

Virtual desktops allow employees to remotely access their traditional systems from any location, eliminating device storage concerns as well as numerous other headaches for IT managers. For example, if the IT department had to install a suitable desktop environment on every device used by every employee throughout the company, then provide technical support and roll out regular patches for each one, the workload would likely far exceed the department’s capacity.

A Central Virtualized Desktop

With virtual desktops, individuals working off-site can still access all the tools held within their office work stations, from the operating systems to essential applications and associated data. Not only is this more convenient for them, but it is more practical and less cumbersome for IT administrators. All sensitive information and tools are housed and managed in a secure location, mitigating the risks to company data if a security breach compromises an employee’s mobile device.

All of the company resources being accessed remotely are stored in secure data centers. Rather than having to constantly update and patch the myriad of tablets and smartphones that workers use while outside the office, IT managers can focus on deploying security measures that govern remote access privileges. Though this doesn’t completely eliminate the possibility of an attack against an employee’s mobile device affecting the organization, it greatly reduces those risks—more so than any alternative—and better equips IT personnel to safeguard important information.

According to a survey from U.K.-based market research firm Visiongain, more than half of U.S. respondents are either planning to virtualize their desktops or are considering exploring this option within the next 12 months. Visiongain also states that the world market for Virtual Desktop Infrastructure (VDI) products reached $11.6 billion in 2012, and predicts annual growth of almost 15 percent through 2015.

Where VPNs Come Into Play

Paramount to any VDI is a secure link between the virtual desktop and the device being used by an off-site worker to access it. As such, VPNs are indispensable. They ensure that data is transported across a secured, encrypted connection.

However, this is far from a “one-size-fits-all” solution. On-the-go employees will often use various mediums to connect to their virtual desktops, including public Wi-Fi networks at airports and hotels or local networks at the offices of current or prospective clients. A company’s VPN system has to be configured to securely handle all of these options if users are going to be able to safely and efficiently access their virtual desktop environments. What’s more, VPNs must be able to seamlessly handle transitions from one medium to the next, such as LAN to Wi-Fi, so that the connection is not lost or processes are not interrupted at inopportune times. If access proves problematic, the benefits of VDI begin to dissipate.

In order for companies to tap into the benefits of virtualized desktops, they must invest in robust VPN solutions that account for all possibilities and automatically initiate the proper security settings based on the communication medium an employee is using. Whether in a coffee shop with public Wi-Fi or another office location within the same organization, the VPN should be able to manage them all. Such a task is perfectly fitted to a dynamic personal firewall. Where run-of-the-mill VPN systems might fail, expertly developed and well-matured solutions will not.

This is part two in our Q&A series on SSL VPNs. Earlier this week, we shared insight from Rainer Enders, CTO, Americas at NCP engineering, on the inception of SSL VPN and its key differentiators.

Q: What are the core strengths of SSL VPN, and when might enterprises choose to go with this protocol over IPsec VPN?

Joerg Hirschmann: The pre-installed, SSL approach is ideal for situations in which one doesn’t require transparent connections for secure remote access. For instance, SSL VPN is an optimal solution when enterprises must grant limited access to external associates or partners needing connections only to specific applications (e.g. web-based) or administrative access to specific machines through RDP or SSH sessions. However, the ideal secure remote access solution takes a hybrid approach combining the strengths of both SSL and IPsec.

Q: What about choosing to go with software solutions versus hardware appliances?

Joerg Hirschmann: A software solution is the ideal fit for a virtualized central environment, whereas appliances are usually a better fit in branch offices or a smaller environment without virtualization in place.

If you have any questions on VPNs, the IPsec and SSL protocols or anything else related to secure remote access, send them to editor@vpnhaus.com. 

 Joerg Hirschmann is CTO at NCP engineering GmbH

This is part one in our Q&A series on SSL VPNs.

Q: When SSL VPN followed IPsec VPN into the world of remote access, what was its initial purpose? How did it differentiate?

Rainer Enders: SSL VPN was introduced to address various shortcomings of IPsec VPN, such as usability, interoperability and scalability. In particular, the IPsec client-based approach was regarded as a process that was difficult to manage from both administrators’ and users’ perspectives.

When SSL was initially introduced, it was considered a client-less technology. The terminology “client-less” was created to differentiate from the IPsec client-centric approach. Obviously, SSL VPN is not client-less, as a client is still involved and is typically in the form of a web browser. Therefore, the key differentiator between the two approaches is that the SSL VPN client comes pre-installed on all OS platforms in the form of the browser, whereas IPsec VPN is separate software that, in many cases, must be installed.

Q: When should companies use a browser-based SSL VPN for secure remote access? How does this differ from applications of a Thin Client SSL VPN?

Rainer Enders: When deploying SSL VPN, great care must be taken to implement and secure the digital signature architecture. Web proxy and thin client SSL are restricted to certain access modes, and as such, should only be used in projects with limited scope with compliant access environments. SSL VPN should not be used for high security environments, as there are more points of attack and vulnerabilities.

Rainer Enders is CTO, Americas, at NCP engineering.

Stay tuned for more expert insight on SSL VPNs later this week from Joerg Hirschmann, CTO at NCP engineering GmbH.

NCP engineering is proud to announce that it has been named a finalist in the IPsec/SSL/VPN category of Info Security Products Guide’s 2013 Global Excellence Awards. The NCP Secure Enterprise Solution was once again recognized for its superiority in providing comprehensive security to companies with large, complex remote access environments.

Designed to make secure remote access simple, the NCP Secure Enterprise Solution is a centrally managed software
solution that provides IT staff with total end-to-end security, unlimited scaling, complete policy freedom and multiple VPN system setup and control. Comprised of the NCP Secure Enterprise Clientthe NCP Secure Enterprise VPN Server and NCP Secure Enterprise Management (SEM), the solution is interoperable with all major network-layer security technologies, including VPN gateways and firewalls.

The information security research and advisory guide’s recognition of NCP further demonstrates the company’s market leadership, having recently been named a finalist in the 2013 SC Magazine Reader Trust Awards for its SEM 3.0. Patrick Oliver Graf, general manager, Americas commented on this sustained momentum:It’s an honor to be recognized by Info Security Products Guide and continue our streak of awards. This distinction is a testament to our holistic remote access VPN solution, which continues to meet the demands of today’s increasingly mobile workforce while fulfilling enterprises’ security and management requirements.”

Stay tuned, as the winners of Info Security Products Guide’s 2013 Global Excellence Awards will be announced at a banquet dinner in San Francisco on February 27, 2013.

InfoSec 2013

Great news! NCP engineering is proud to announce that it has been named a finalist in the Best IPSec/ SSL VPN category of the renowned 2013 SC Magazine Reader Trust Awards  for the second consecutive year! SC Mag

The NCP Secure Enterprise Management  3.0 solution was recognized by the SC Magazine’s tech-savvy audience for providing unparalleled security and flexibility to enterprises.  As a bit of background on the product, the NCP SEM 3.0 system significantly reduces a company’s risk profile related to complex or badly-managed technology. With the new SEM, one administrator is able to centrally support 10,000+ secure remote users through all phases, and update rule-sets based on individual users’ devices and network connections.

Built around the all-new NCP Advanced Authentication, the NCP SEM 3.0 elevates the security of the entire NCP Secure Enterprise Solution, which is also comprised of a VPN client suite, hybrid IPsec/SSL VPN serverand the remote access VPN management system. The NCP Advanced Authentication eliminates the need for third-party solutions by enabling Two-Factor Authentication with a One-Time Password that users receive via SMS.

This is another notch on NCP’s growing belt of commendations, as NCP was recently granted Gold in the 2012 Golden Bridge Awards and last year was distinguished with the Network Products Guide’s 2012 Hot Companies and Best Product Awards and the Info Security Product Guide’s 2012 Global Excellence Awards.