(Go: >> BACK << -|- >> HOME <<)

IPsec (IP security) is a standardized framework for securing Internet Protocol (IP) communications by encrypting and/or authenticating each IP packet in a data stream. There are two modes of IPsec operation: transport mode and tunnel mode. In transport mode only the payload (message) of the IP packet is encrypted. It is fully-routable since the IP header is sent as plain text; however, it can not cross NAT interfaces, as this will invalidate its hash value. In tunnel mode, the entire IP packet is encrypted. It must then be encapsulated into a new IP packet for routing to work.

IPSec


Juniper Networks

Network Security Handbook for Service Providers

published by Juniper Networks on Dec 05, 2008

As network services migrate to IP, it is essential that they be vigilant about security. Network infrastructure must defend itself from attacks and operators must implement network security best practices.

Quocirca

The Essential Elements of Secure Remote Access Without the Management Headaches

published by Quocirca on Apr 07, 2008

Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 

NCP Engineering GmbH

The Essential Elements of Secure Remote Access...without the Management Headaches

published by NCP Engineering GmbH on Apr 07, 2008

While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.

IBM

Integrated Business Communications: A Force For Business Transformation

published by IBM on Oct 11, 2006

Many forward-thinking organizations are beginning to see the true potential of the convergence of voice, video and data.  It has the power to transform business relationships, business processes and collaboration between employees, suppliers and customers.

Qualys

There's a Hole in Your Network: Vulnerability Management Is No Mystery

published by Qualys on Aug 08, 2006

Learn how vulnerability management allows you to keep on top of these problems by identifying an organization's greatest security vulnerabilities and proactively recommending fixes.

Qualys

Don't Dread that Network Audit: Compliance with Government Regulation and Industry Standards

published by Qualys on Aug 08, 2006

Security administrators need to be more proactive about preventing attacks, making vulnerability assessments a crucial tool in their portfolio.

Aventail

The SSL VPN Buyer's Guide

published by Aventail on Jun 21, 2006

The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.

Aventail

Why Replace your IPSec for Remote Access

published by Aventail on Jun 21, 2006

To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.

Aventail

The SSL VPN Toolkit

published by Aventail on Jun 21, 2006

The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).

Aventail

IPSec vs. SSL VPNs for Secure Remote Access

published by Aventail on Jun 21, 2006

Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...

NitroSecurity

The Performance Advantage: NitroSecurity's Aggregation and Correlation Engine

published by NitroSecurity on Nov 03, 2005

NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.

Cisco

Cisco ASA 5500 Series Business Edition

published by Cisco on Dec 27, 2007

The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.

Axeda Corporation

Secure Remote Vendor Access to the Enterprise Data Center

published by Axeda Corporation on Sep 05, 2007

Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.



More Security Topics

Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, Phishing, PKI, Policy Based Management, Security Management, Security Policies, Single Sign On, SSL, Secure Instant Messaging, Web Service Security, PCI Compliance, Vulnerability Management

Search The Library

Related Topics

Access Control
128 Documents
IP Networks
82 Documents
Internet Security
144 Documents
Monitoring
50 Documents
Network Security
160 Documents
Remote Access
57 Documents
Security
430 Documents
Tunneling
3 Documents
VPN
49 Documents

Special Report

MarketScope for Ajax Technology and RIA Platforms

Internet application platforms are evolving as the market matures. Ajax Technology and RIA platforms, despite being available since 1999, are no exception. Learn about these leading platforms in this comprehensive white paper.