NETWORK WORLD NEWSLETTER: TIM GREENE ON VPNS
06/09/05
Today's focus: Adtran releases integrated access device
Dear networking.world@gmail.com,
In this issue:
* Adtran IAD terminates IPSec VPN sessions
* Links related to VPNs
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by RSA Security(R)
Does the V in your VPN stand for Vulnerable?
If you're building VPN security on static, reusable passwords,
you're just waiting to be hacked. RSA SecurID(r) technology
protects you from unauthorized access with industry-leading
two-factor user authentication that lets you know who is doing
what over your VPN.
To learn more, order our Anti-Hacker Guide to VPNs today!
http://www.fattail.com/redir/redirect.asp?CID=106084
_______________________________________________________________
NW'S RESEARCH CENTER ON SPAM
Go to NW's Research Center on spam and find our in-depth review
of 16 anti-spam products, our spam calculator to determine how
much spam is costing your enterprise each year, the latest spam
news, advice on how to fight spam and more. For the latest on
spam click here:
http://www.fattail.com/redir/redirect.asp?CID=106028
_______________________________________________________________
Today's focus: Adtran releases integrated access device
By Tim Greene
Adtran is coming out with an integrated access device that can
terminate IPSec VPN sessions, making it a flexible option for
businesses.
The Total Access 9000 device can support traditional voice
calls, IP voice calls and data over a single service-provider
access line.
By also supporting VPN termination the device can give
businesses the choice to use Internet connections for data
transfers. For instance, a business might have an IAD at one
site to connect to an MPLS VPN service, but another site might
be beyond the reach of the MPLS service. In that case a second
IAD could be placed at the non-MPLS site and create an IPSec
link to the rest of the VPN. In that way, all sites could
connect with each other even though the individual links might
be supported by different underlying technology.
Total Access 9000s autoconfigure, so when one is plugged into a
network it can be directed to a Web site where it can pull down
updates and configuration settings.
The IAD comes in three models that support 12, 16 or 24 analog
phone ports. An office could plug in that many regular phones to
the device and connect to a phone service through the same line
that supports data connections and the VPN.
The IAD relies on a service provider splitting the traditional
voice from data in its network, so these boxes will likely show
up at customer sites as part of a managed VPN service. But it's
an option that's out there that businesses can look for when
they are weighing WAN service options.
_______________________________________________________________
To contact: Tim Greene
Tim Greene is a senior editor at Network World, covering virtual
private networking gear, remote access, core switching and local
phone companies. You can reach him at <mailto:tgreene@nww.com>.
_______________________________________________________________
This newsletter is sponsored by RSA Security(R)
Does the V in your VPN stand for Vulnerable?
If you're building VPN security on static, reusable passwords,
you're just waiting to be hacked. RSA SecurID(r) technology
protects you from unauthorized access with industry-leading
two-factor user authentication that lets you know who is doing
what over your VPN.
To learn more, order our Anti-Hacker Guide to VPNs today!
http://www.fattail.com/redir/redirect.asp?CID=106083
_______________________________________________________________
ARCHIVE LINKS
Breaking VPN news from Network World, updated daily:
http://www.networkworld.com/topics/firewalls.html
Archive of the VPN newsletter:
http://www.networkworld.com/newsletters/vpn/index.html
_______________________________________________________________
Cover your assets: TodayUs new security initiative
The need to deploy multiple security applications to safeguard
critical information assets has become a mandatory requirement
in the fight against both known and unknown attacks. Enter the
concept of asset-centric security, a new way of thinking about
network security. Tune in now to this valuable webcast.
http://www.fattail.com/redir/redirect.asp?CID=105743
_______________________________________________________________
FEATURED READER RESOURCE
VoIP SECURITY
For the latest in VoIP security, check out NW's Research Center
on this very topic. Here you will find a collection of the
latest news, reviews, product testing results and more all
related to keeping VoIP networks secure. Click here for more:
<http://www.networkworld.com/topics/voip-security.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To unsubscribe from promotional e-mail go to:
<http://www.nwwsubscribe.com/Preferences.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment