Question: There are many best practices recommended for remote access using VPN technologies. From defining the classes of users and levels of access allowed for each

There are many best practices recommended for remote access using VPN technologies. From defining
the classes of users and levels of access allowed for each user class, to determining how much idle VPN
connection time is allowed before automatic connection termination is executed.
Instructions:
Consider what you have read in chapter 10 on VPN management. One common best practice idea is to
only allow company issued hardware to connect to the internal corporate network. Users often want to
use their personal devices that are newer and perhaps allow more efficiency in getting work done
remotely.
Conduct internet research on the topic of personal device usage for remote access to corporate
networks and resources using VPN technologies and create a research informed opinion on the pros and
cons of personal device usage as previously described.
Main Post:
Discuss your research informed opinion and address the following points:
Is the use of corporate equipment for remote access to corporate networks the only safe
option?
Is there a safe option for user provided equipment?
How does VPN best practices and policy management change if corporations allow user
provided equipment to access corporate networks?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!