2021-11-29T06:31:00Z
EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 2
  • 762

What are the best practices to prevent a Brute Force attack via remote access?

Which modern tools would you recommend using to prevent this type of attack?

3
PeerSpot user
3 Answers
GA
Endpoint Security Manager at Catholic Health Initiatives
Real User
2021-12-02T15:27:24Z
Dec 2, 2021

SES is what I use as a prescriptive security measure to discourage brute force attacks on Windows and Mac devices. 

P2P control:
https://techdocs.broadcom.com/...

Search for a product comparison in SSL VPN
CJ
Chief Executive Officer at Clemtech LLC
Real User
Top 5
2021-11-30T18:26:34Z
Nov 30, 2021

The best way to prevent these attacks is to activate a secure virtual private (VPN) network. The VPN permits remote access using the same software as if accessed locally.  


There can be security issues with VPNs during the 1 connection phase. Specifically, during activation, a private key is exchanged.  This is a point of vulnerability because once the VPN is connected keys are sent over the network to initiate private data exchanges.  


ClemTech LLC offers a proprietary network solution with a VPN that retains the private key local at the device.  Our matchmaker establishes the VPN connection. There are no key exchanges across the private network during any phase and none during bidirectional data exchanges. See IOT - ClemTech LLC

GA
Endpoint Security Manager at Catholic Health Initiatives
Real User
2021-11-30T16:49:57Z
Nov 30, 2021

SEP/SES and its firewall have a feature to stop this:


1. Use location-aware FW rules and policy with allowed access lists to only jump servers.


2.  Enable SEP/SES P2P enforcement - Peer-to-Peer Authentication Settings (broadcom.com).

GA
Endpoint Security Manager at Catholic Health Initiatives
Real User
Dec 2, 2021

@Clement Johnson No sir, HIPS and HFW are not cumbersome to manage, and PnP solutions are most common way you get Compromised, PNP then gives you have an excuse to blame someone else secret sauces for felling you and your business, exposing your business to extortion, and fraud. Do it right , and manage the access list. I have a team of 5, we do this for 150k endpoints and servers, at it for 7 years. No crypto events in that period.  The key to this, is the "how". We can setup a zoom chat and i can give you a brief example. 

PeerSpot user
Learn what your peers think about Pulse Connect Secure. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
685,707 professionals have used our research since 2012.
Related Questions
EB
Director of Community at PeerSpot (formerly IT Central Station)
Nov 23, 2022
Hi infosec pros, How are these two terms different? What modern tools and techniques should you use to protect each data?
2 out of 6 answers
Mar 2, 2022
Data protection at rest - data storage has encryption applied, at the OS, Container, or DB level.  a bad actor cannot defeat the security controls and read the data by accessing copying the drive, container, or other storage  Data protection in transit - data being transported "outside" of, or between, trusted home environment(s) has encryption applied, such as an SSL tunnel, VPN, or IPSec-enabled route.  "trusted" in this definition is wherever the data is stored, or processed, and assumes that such an environment has sufficient controls to block 3rd party access.  Data protection in use (even though you didn't ask :) )  - data is encrypted or otherwise protected (such as pseudo anonymization for privacy data) while being processed, within an application or service (e.g. AWS Lambda).  the intent is that malicious software with access to the service/process RAM or temp storage cannot discover meaningful data through that access.
PW
IT Consultant & Trainer at ReallySimpleTech, Inc.
Mar 4, 2022
"Data protection at rest" means when it is stored on the hard drive, tape backup, USB dongle, external drive, or anything where the data is stored to be retrieved later it is encrypted.  However, when you access that data to use the file it is unencrypted so that it can be utilized.   "Encryption in transit" means that as you transfer a file from one drive to another, Email, FTP, etc. it is also encrypted so that it can not be intercepted while being moved.   I use Microsoft BitLocker full disk encryption for local storage and IPSEC between my computers at home. When connecting externally I use SSL, HTTPS VPN. I use Outlook for email and connect to Office 365 using IMAP/SMTP using SSL encryption protocols.   Thanks, Patrick
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Sep 19, 2021
Hi all, What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community. Thanks for sharing your experience!
See 1 answer
EB
Director of Community at PeerSpot (formerly IT Central Station)
Sep 19, 2021
Hi @Chetan Woodun, @Felician (Felix)Farcutiu, @SIVASHANMUGAM NATARAJAN, @John Dutoit, @Philippe Panardie and @Letsogile Baloi.  What inputs can you share here with other peers? 
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 27, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 SSL VPN Tools to help you decide w...
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 27, 2022
Top 8 SSL VPN Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Download Free Report
Download our free Pulse Connect Secure Report and get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
DOWNLOAD NOW
685,707 professionals have used our research since 2012.