Threat Free Tunneling : Securing the VPN Traffic
30/11/2012
What if your VPN is securing a malware? Is the VPN used to deliver malware securely? Attackers are leveraging insecure VPN connections to access critical data inside the enterprise. The attacks on TJX, Heartland Payment Systemsand even the attacks on Google, Adobe andmore than 30 other large technology companies, defense contractors and big companies, were carried out remotely with legitimate access over VPN connections. Cyberoam UTM's Threat Free Tunnelling (TFT) security is driven by the premise that the perimeter / endpoint of any functionally accessible network, is inherently insecure.
Attachments :
Threat Free Tunneling : Securing the VPN Traffic