In Figure 10-1, remote access users at an Internet caf , airport Internet kiosk, and a hotel access the corporate network using variously HTTPS, POP3S, SMTPS, and port forwarding (TCP-based ...
As remote access to business networks increases and as threats against these networks grow, IT executives need to support technology that is flexible and that can combat evolving attacks effectively.