Talk With an Expert

Secure Internet Gateways: Backing Down from a Fight

Secure Internet Gateways: Backing Down from a Fight (PDF, 1.75MB)Published: 02 Nov, 2018
Created by
Seth Polley

When does a security agent become a double agent? On-premise corporate devices are protected by a stack of security products, whereas remote clients have traditionally relied on DNS, Proxy, and/or VPN solutions to obtain the same levels of protections. These remote clients typically utilize lightweight agents that run on the devices with the intention of enforcing security and/or policy-based protections - no matter which offsite networks the corporate device connects to. Frequently though, there are provisions to deactivate the agent when the computer connects to the local network. As the security professional charged with protecting your company's remote assets - do you know the extent of these 'back-off' scenarios? This Gold Paper will discuss some of the commonly known scenarios, but will delve further into the unknowns which may surprise you.

Secure Internet Gateways: Backing Down from a Fight