WAN Acceleration: Best Practices for Preserving Security
by Craig Stouffer - Monday, 6 November 2006.
IPsec can be performed outside of the acceleration appliance, but it typically must occur downstream of this device. Otherwise, the appliance will not have visibility into traffic traversing the WAN, limiting its ability to provide significant performance gains.

Secure access: TACACS+ and/or RADIUS can be used to prevent unauthorized users from accessing network acceleration appliances. In addition, secure interfaces can be provided on all management consoles, including SNMPv3 and HTTPs. User credentials should be stored in as few places as possible, preferably in a secure environment, such as a purpose-built data center.

Conclusion

As more and more enterprises undergo server centralization projects, new products will be introduced to improve network and application performance. By following basic security precautions, enterprises can ensure that these performance improvements do not come at the expense of data security. In fact, by enabling the centralization of key resources, enterprises are actually increasing their ability to secure business information, which ultimately ensures better compliance with the key regulatory measures that are having an increasingly complicated effect on the way that everyone does business.

Spotlight

Fighting malware, emerging threats and AI

Posted on 24 November 2014.  |  Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the cloud.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Nov 25th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //