## Despite the growth of IP-VPN capabilities too little attention has been paid to date to other key enterprise trends such as the increasing use of other virtual services and the growing use of enterprise directories. As the nature and number of relationships between the enterprise and the servic
User authentication, VPN in an appliance
โ Scribed by Helen Meyer
- Book ID
- 104297955
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 126 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
cation, extranets for inter-company communications, and electronic commerce applications. PKIs will possibly be the foundation for a new generation of remote access,Virtual Private Networking (VPN), and businesscritical applications. A PKI is a dynamic system, the underlying framework that makes security technologies work together. In most cases, it will include digital certificates and public-key algorithms, integrating them with access-control policies and directories and allowing someone within the company or at a third party service to manage, control and modify policies on an asneeded basis. PKI may prove to be the wedge that breaks the Internet commerce logjam. It could be a powerful tool for enabling secure communications and data processing into the next century. But right now network managers and their organizations must forge strategies and educate themselves about their goals for the PKI, products they will use to build it, and how to use and deploy PKI-enabled applications. IANTimes, October 13, 1997, p. 50.
๐ SIMILAR VOLUMES