WAN Acceleration: Best Practices for Preserving Security
by Craig Stouffer - Monday, 6 November 2006.
IPsec can be performed outside of the acceleration appliance, but it typically must occur downstream of this device. Otherwise, the appliance will not have visibility into traffic traversing the WAN, limiting its ability to provide significant performance gains.

Secure access: TACACS+ and/or RADIUS can be used to prevent unauthorized users from accessing network acceleration appliances. In addition, secure interfaces can be provided on all management consoles, including SNMPv3 and HTTPs. User credentials should be stored in as few places as possible, preferably in a secure environment, such as a purpose-built data center.

Conclusion

As more and more enterprises undergo server centralization projects, new products will be introduced to improve network and application performance. By following basic security precautions, enterprises can ensure that these performance improvements do not come at the expense of data security. In fact, by enabling the centralization of key resources, enterprises are actually increasing their ability to secure business information, which ultimately ensures better compliance with the key regulatory measures that are having an increasingly complicated effect on the way that everyone does business.

Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //