Do off-site workers require remote access?

As remote access is becoming more common, authentication opportunities are on the rise. Find out what you should know about your customer's remote employees before implementing any authentication solution.

Do you allow end users to access the network remotely? If so, how many end users have remote access?

Remote access has become a much more common occurrence for many organizations. Workers connect from home and work through virtual private networks, check their email from Web page interfaces and use a number of other common network protocols to access servers on the network. If your customer's organization has remote employees or allows remote access, you need to ensure that the authentication mechanisms adequately restrict access to only those individuals authorized to access resources.

About the author
Russ Rogers is an information security expert and author of Nessus Network Auditing, 2nd Edition. Russ is currently a penetration tester for the federal government.

The number of workers requiring remote access is also an important consideration. If the only individuals remotely accessing the customer's network resources are a couple of network administrators who occasionally need to reboot a router or tweak a switch, a simple SSH implementation may be sufficient. But if the customer has 50+ employees who all need direct access to the primary servers, you're going to need an authentication mechanism that ties into the internal network through a secure channel of some sort.

This was last published in September 2008

Dig Deeper on Identity management and access controls

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close