Problem solve Get help with specific problems with your technologies, process and projects.

Can cloud VPNs completely secure network traffic?

In this Ask the Expert response, VPN expert Rainer Enders discusses cloud VPN security and how enterprises can best protect their network's perimeter.

Can a cloud VPN completely secure your network traffic? What additional network security protection do you need after implementing a cloud VPN?

Complete security does not exist, cloud or no-cloud. However, there are specific cloud computing security-related and service-related considerations that must be addressed. An interesting question in cloud environments is the necessity of a network perimeter. Whereas servers and virtual machines can be secured tightly with a traditional perimeter, cloud VPNs may need a perimeter firewall in addition to the device and server firewalls which can be provided by the operating system and additional security software. Additionally, a network perimeter in the form of a UTM firewall may be particularly useful for enterprises which have a variety of networked devices that need to be protected. For other environments though, managing the devices, end-user access and central administrative control are critical to ensuring cloud VPN security.

Email your VPN-related questions to editor@searchenterprisewan.com.

This was last published in November 2011

Dig Deeper on Cloud Networking

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.