IPsec (IP security) is a standardized framework for securing Internet Protocol (IP) communications by encrypting and/or authenticating each IP packet in a data stream. There are two modes of IPsec operation: transport mode and tunnel mode. In transport mode only the payload (message) of the IP packet is encrypted. It is fully-routable since the IP header is sent as plain text; however, it can not cross NAT interfaces, as this will invalidate its hash value. In tunnel mode, the entire IP packet is encrypted. It must then be encapsulated into a new IP packet for routing to work.
IPSec
Network Security Handbook for Service Providers
published by Juniper Networks on Dec 05, 2008
As network services migrate to IP, it is essential that they be vigilant about security. Network infrastructure must defend itself from attacks and operators must implement network security best practices.
The Essential Elements of Secure Remote Access Without the Management Headaches
published by Quocirca on Apr 07, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy.
The Essential Elements of Secure Remote Access...without the Management Headaches
published by NCP Engineering GmbH on Apr 07, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Integrated Business Communications: A Force For Business Transformation
published by IBM on Oct 11, 2006
Many forward-thinking organizations are beginning to see the true potential of the convergence of voice, video and data. It has the power to transform business relationships, business processes and collaboration between employees, suppliers and customers.
There's a Hole in Your Network: Vulnerability Management Is No Mystery
published by Qualys on Aug 08, 2006
Learn how vulnerability management allows you to keep on top of these problems by identifying an organization's greatest security vulnerabilities and proactively recommending fixes.
Don't Dread that Network Audit: Compliance with Government Regulation and Industry Standards
published by Qualys on Aug 08, 2006
Security administrators need to be more proactive about preventing attacks, making vulnerability assessments a crucial tool in their portfolio.
The SSL VPN Buyer's Guide
published by Aventail on Jun 21, 2006
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Why Replace your IPSec for Remote Access
published by Aventail on Jun 21, 2006
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility. Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
The SSL VPN Toolkit
published by Aventail on Jun 21, 2006
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
IPSec vs. SSL VPNs for Secure Remote Access
published by Aventail on Jun 21, 2006
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
The Performance Advantage: NitroSecurity's Aggregation and Correlation Engine
published by NitroSecurity on Nov 03, 2005
NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.
Cisco ASA 5500 Series Business Edition
published by Cisco on Dec 27, 2007
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Secure Remote Vendor Access to the Enterprise Data Center
published by Axeda Corporation on Sep 05, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
More Security Topics
Search The Library
Related Topics
Special Report
MarketScope for Ajax Technology and RIA Platforms
Internet application platforms are evolving as the market matures. Ajax Technology and RIA platforms, despite being available since 1999, are no exception. Learn about these leading platforms in this comprehensive white paper.