Here are some simple things to consider as we normalize in our potential for longer-term quarantine.
When it comes to terminating VPNs at the border, think redundancy
Many companies use a Next-Generation Firewall (NGF) at the edge. NGFs are great little boxes, filled with features --traditional firewalls, routing, intrusion prevention, anti-malware and SSL and IPSec VPN Concentrators. Here's the problem: in generic terms, if you turn on VPN and Intrusion Prevention in many of these firewalls, performance drops... fast. You could lose as much as 70% of your speed. Add in SSL Inspection, and that amazing hardware-based box comes to a screeching halt, crawling, frustrating workers and costing the company valuable productivity time. What to do about it:
- Separate those duties into independent functions
- Consider adding High Availability (HA) pairs to allow for failover
- Have a backup plan if you find your current inbound bandwidth swamped
Consider adding High Availability (HA) pairs to allow for failover. High availability is the

Have a backup plan if you find your current bandwidth is swamped. Most companies had planned for only a fraction of their workforce to be remote --sales, executives, support, and maybe a few dedicated telecommuters. If you had 100Mb of bandwidth set aside for remote access for 10% of your company, how much bandwidth will you need when the other 90% gets quarantined? The math isn't hard. Look at what's used internally, taking into consideration actual utilization, and plan.
--------------------------------------------
TRUSTED INTERNET IS A MANAGED SECURITY SERVICES PROVIDER
We install next-generation firewalls, managed antivirus, and an anti-evasion toolkit in your home or office, and then monitor and manage them remotely, 24x7. If we see a threat, we stop it.
Contact us
Contact us
800-853-6431
staysafeonline@trustedinternet.io
No comments:
Post a Comment