Complete security does not exist, cloud or no-cloud. However, there are specific cloud computing security-related and service-related considerations that must be addressed. An interesting question in cloud environments is the necessity of a network perimeter. Whereas servers and virtual machines can be secured tightly with a traditional perimeter, cloud VPNs may need a perimeter firewall in addition to the device and server firewalls...
which can be provided by the operating system and additional security software. Additionally, a network perimeter in the form of a UTM firewall may be particularly useful for enterprises which have a variety of networked devices that need to be protected. For other environments though, managing the devices, end-user access and central administrative control are critical to ensuring cloud VPN security.
Email your VPN-related questions to email@example.com.
Dig deeper on VPN setup and configuration
Related Q&A from Rainer Enders, VPN expert
Administrators don't have to worry about interoperability; integrated mobile application and device management is the best approach.continue reading
Ensuring that the client software itself is up to date is just one of many reasons why it's critical to oversee VPN clients.continue reading
To ensure mobile device security, VPN expert Rainer Enders explains that it is crucial to monitor changed states and block software modifications.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.