Try our new research platform with insights from 80,000+ expert users

What are the best practices to prevent a Brute Force attack via remote access?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 1
  • 130
PeerSpot user

3 Answers

Last answered Dec 2, 2021
GA
Endpoint Security Manager at Catholic Health Initiatives
Real User
Dec 2, 2021
Search for a product comparison in SSL VPN
CJ
Chief Executive Officer at Clemtech LLC
Real User
Nov 30, 2021
GA
Endpoint Security Manager at Catholic Health Initiatives
Real User
Nov 30, 2021
GA
Endpoint Security Manager at Catholic Health Initiatives
Real User
Dec 2, 2021

@Clement Johnson No sir, HIPS and HFW are not cumbersome to manage, and PnP solutions are most common way you get Compromised, PNP then gives you have an excuse to blame someone else secret sauces for felling you and your business, exposing your business to extortion, and fraud. Do it right , and manage the access list. I have a team of 5, we do this for 150k endpoints and servers, at it for 7 years. No crypto events in that period.  The key to this, is the "how". We can setup a zoom chat and i can give you a brief example. 

PeerSpot user
Find out what your peers are saying about Ivanti, Cisco, Citrix and others in SSL VPN. Updated: October 2025.
880,435 professionals have used our research since 2012.
Identity Management (IM)
Identity Management is crucial for organizations to safeguard user identities, manage authorization, and ensure compliance. It provides streamlined solutions for managing user access and protecting sensitive data. Effective management of identities minimizes security risks and enhances user experience.Identity Management solutions integrate technologies that automate and simplify identity, authentication, and access control. They are critical in supporting enterprise security frameworks by...
Download Identity Management (IM) ReportRead more