Coming October 25: PeerSpot Awards will be announced! Learn more
2021-02-23T07:40:00Z
HA
User at Western Dental Services
  • 1
  • 45

What is the best appliance for SSL VPN and a fat client?

Hi peers,

I am planning to run a multi-POC with Palo Alto, Pulse, and OpenVPN. 

Any recommendations?

Thanks for the help!

1
PeerSpot user
1 Answer
RM
User at Exclusive Networks
Real User
2022-01-05T14:50:15Z
05 January 22

I have worked on Pulse VPN (Now Ivanti), can say it will beat OpenVPN any day. With Palo Alto there are advantages with Pulse, it being a dedicated VPN solution, has purpose-built hardware. And from a software features perspective, it has a best-in-class Host Checker (also known as compliance or posture checker).

So, any user that connects remotely must also comply with specific IT policies.


Say, Antivirus firmware version should be no more than N-3, and the last scan within last 10 days, PC must be from a specific domain, should have or not have certain processes/applications running, while connecting over VPN.


This check will happen before and you can either block or alert users that they are not compliant. Also, post connection it can continuously run checks and let's say the moment a banned application is opened, they are disconnected.   


And it also ensures the user is highly likely a genuine user that someone who somehow managed to get employee credentials. So you are doing identity + device check using one feature.



Ivanti comes from a strong endpoint and asset management background and has integrated a lot of endpoint-specific features in the VPN solution - Connect Secure. 
I haven't worked on it, but the new firmware is said to have automated workflows for day-to-day tasks, to improve operational efficiency, something every solution must have in the next decade.

Find out what your peers are saying about Pulse Secure, Citrix, Cisco and others in SSL VPN. Updated: September 2022.
635,162 professionals have used our research since 2012.
Related Questions
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Sep 02, 2022
Hi infosec pros, How are these two terms different? What modern tools and techniques should you use to protect each data?
2 out of 5 answers
02 March 22
Data protection at rest - data storage has encryption applied, at the OS, Container, or DB level.  a bad actor cannot defeat the security controls and read the data by accessing copying the drive, container, or other storage  Data protection in transit - data being transported "outside" of, or between, trusted home environment(s) has encryption applied, such as an SSL tunnel, VPN, or IPSec-enabled route.  "trusted" in this definition is wherever the data is stored, or processed, and assumes that such an environment has sufficient controls to block 3rd party access.  Data protection in use (even though you didn't ask :) )  - data is encrypted or otherwise protected (such as pseudo anonymization for privacy data) while being processed, within an application or service (e.g. AWS Lambda).  the intent is that malicious software with access to the service/process RAM or temp storage cannot discover meaningful data through that access.
PatrickWheaton - PeerSpot reviewer
IT Consultant & Trainer at ReallySimpleTech, Inc.
04 March 22
"Data protection at rest" means when it is stored on the hard drive, tape backup, USB dongle, external drive, or anything where the data is stored to be retrieved later it is encrypted.  However, when you access that data to use the file it is unencrypted so that it can be utilized.   "Encryption in transit" means that as you transfer a file from one drive to another, Email, FTP, etc. it is also encrypted so that it can not be intercepted while being moved.   I use Microsoft BitLocker full disk encryption for local storage and IPSEC between my computers at home. When connecting externally I use SSL, HTTPS VPN. I use Outlook for email and connect to Office 365 using IMAP/SMTP using SSL encryption protocols.   Thanks, Patrick
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Dec 02, 2021
Which modern tools would you recommend using to prevent this type of attack?
2 out of 3 answers
Gregory Anderson - PeerSpot reviewer
Endpoint Security Manager at Catholic Health Initiatives
30 November 21
SEP/SES and its firewall have a feature to stop this: 1. Use location-aware FW rules and policy with allowed access lists to only jump servers. 2.  Enable SEP/SES P2P enforcement - Peer-to-Peer Authentication Settings (broadcom.com).
Clement Johnson - PeerSpot reviewer
Chief Executive Officer at Clemtech LLC
30 November 21
The best way to prevent these attacks is to activate a secure virtual private (VPN) network. The VPN permits remote access using the same software as if accessed locally.   There can be security issues with VPNs during the 1 connection phase. Specifically, during activation, a private key is exchanged.  This is a point of vulnerability because once the VPN is connected keys are sent over the network to initiate private data exchanges.   ClemTech LLC offers a proprietary network solution with a VPN that retains the private key local at the device.  Our matchmaker establishes the VPN connection. There are no key exchanges across the private network during any phase and none during bidirectional data exchanges. See IOT - ClemTech LLC
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 27, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 SSL VPN Tools to help you decide w...
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 27, 2022
Top 8 SSL VPN Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Related Categories
Download Free Report
Download our free SSL VPN Report and find out what your peers are saying about Pulse Secure, Citrix, Cisco, and more! Updated: September 2022.
DOWNLOAD NOW
635,162 professionals have used our research since 2012.