Virtual Private Network: Synopsis On
Virtual Private Network: Synopsis On
IT Services-
IDS Infotech Limited, established in 1989 has emerged as a leading IT Solutions and Service
provider of this region, catering to the needs of the Global markets. The IDS service portfolio
includes end-to-end Software services in software development, QA & Testing using the
latest cutting edge technologies and methodologies.
Security Audits:-
Most companies are confident about the physical security of their offices, but little is
known about the security of their computer network. It is important for companies to find
out where their network is vulnerable before it is compromised. Security audits can be
done on scheduled intervals that you can set depending on the value of your data and risk
tolerance.
The Process-
Real Time's technical staff will scan and probe your network remotely, searching for
vulnerabilities that could put network services at risk. A network engineer can also go
onsite to check for any internal security issues making sure there is protection from both
external and internal threats. The audit concludes with a written report indicating any
vulnerabilities discovered. The technical staff can also research corrective measures to
security issues, if needed.
The Investment-
Quotes for Security Audits are based on the size of the network and the number of
services running. The number of vulnerabilities also plays an important role... the more
security issues; the longer the audit will take. The final written report is designed to give
you enough information so you will have a choice of using Real Time, internal personnel
or other outside consultants to work on any problems.
Technical Support generally refers to the services which provide assistance for the
technology products. They also help the user in solving certain specific problems. Our
Company provides technical support to our clients over the telephone, through e-mail or on
website. Our experienced technicians provide online support to our clients. Our technicians
are highly responsible and stick to their commitments. We provide best possible service in
the most efficient manner. Our trained Technical Engineers are available 24X7.
We are capable of handling the most difficult software issues and providing effective
solutions. Our experienced technical team will ensure that your computer or network problem
is resolved as quickly as possible. We are here to extend our outstanding customer support
services through self-help or by assisted-help resources. Our technicians analyze the
customer’s problem and sort it out through the best possible solution available. We have the
advanced technical troubleshooting and analysis methods.
Our technical team has been skilled for handling the most difficult or advanced problems too.
We are certified to ensure high level of Information Technology Service and Support
Standards. It’s a proven fact that our support services results in reduce infrastructure
management costs, improve system, network stability, efficiency of staff and increment in
productivity.
We always ensure that are customers get best quality solutions on –time and also at a
reasonable cost. Our technical support technicians can assist you when ever needed or can
provide guidance remotely. We are here to provide best IT services.
Under Network Security, i am doing Virtual Private Network which is decribed as follows.
VPN or Virtual Private Network describes a network that includes secure remote access
for client computers. It can be explained best by looking at its parts. Virtual describes the
fact that the network doesn't need to be physically connected. The Private confirms that
the data is encrypted and can only be viewed by a defined group. The last word,
Network, means that the users configured for VPN can be connected and share files or
information.
For instance, field representatives for a company can work on the "home offices"
network over the Internet. This access will have the same look and feel as if they are
back at the office physically connected to their network, except the reps are working at
the speed of their local modem. The data is sent to and from the reps (or to and from the
network) encrypted, so it's extremely difficult for anyone to snoop on confidential
information.
IPSEC
IPSEC is one of the best VPN solutions. It connects networks via the Internet using
encrypted traffic, so an office in San Francisco can share different files and data with an
office in Boston in a secure fashion. IPSEC also allows Windows 2000 or Windows XP
client machines, which support IPSEC by default, to connect to Real Time's Linux
Firewall.
PPTP
Another option for VPN is PPTP or Point to Point Tunneling Protocol. PPTP works best
connecting Real Time's Firewall Solution with remote client machines running Windows
95/98/ME via encrypted network traffic.
OBJECTIVE OF STUDY
VPN technology is designed to address issues surrounding the current business trend toward
increased telecommuting and widely distributed global operations, where workers must be
able to connect to central resources and must be able to communicate with each other.
Scope of Study
A VPN reduces the number of modems and telephone lines required centrally to support dial-
in networking and dramatically decreases long distance charges since remote PC users would
connect to their local ISP instead of dialing direct to head office.
VPNs use encryption and tunneling to protect confidential information as it travels over the
Internet.
Data Collection
A VPN is a communications environment in which access is controlled to permit peer
connections only within a defined community of interest, and is constructed through some
form of partitioning of a common underlying communications medium, where this
underlying communications medium provides services to the network on a non-exclusive
basis.
A VPN is a private network constructed within a public network infrastructure, such as the
global Internet.
A Virtual Private Network is a connectivity object between two or more private entities. It
uses the Internet or public domain infrastructure and connects private networks.
For example, an administrator may need to know who connected to the system and for how
long in order to construct billing data. Unusual activity may indicate a misuse of the system
or inadequate system resources. Real-time monitoring of equipment (for example, unusually
high activity on one modem and inactivity on another) may generate alerts to notify the
administrator of a modem failure. The tunnel server should provide all of this information,
and the system should provide event logs, reports, and a data storage facility to handle the
data appropriately.