San Francisco, USA − May 25, 2011: Employers are increasingly following the trend towards mobility by enabling their workforce to telecommute, working on the go and in home offices. The increasing sales of the latest MacBook Air and MacBook Pro computers reflect this. Working remotely does offer a great deal of flexibility; however, this flexibility also requires more security. The risks associated with accessing remote networks are far too often overlooked. equinux sheds light on these security risks and shows how to avoid them with VPN Tracker 6.
Port forwarding: The gateway for attackers Users need access to company data from home offices and when traveling. To permit access, administrators often simply open and forward ports on the firewall, leaving the door wide open for unauthorized users. Often, the services exposed through port forwarding are not secure. And even if authentication and data transfer are encrypted, attackers can still exploit bugs and improper configurations. Security updates must immediately be installed for all exposed services and the operating systems they run on. Unpublished security vulnerabilities and delayed security update releases further increase the risk. And on top of that, there's the configuration effort: For every new service that needs to be available outside of the firewall, a new port forward has to be set up. And if two or more services use the same port, they need to be mapped to different, non-standard ports, leading to configuration problems for users
The secure alternative: IPsec VPN As an industry standard, IPsec VPN is the most secure way to connect to internal networks over the Internet. Why? With IPsec VPN, there is one easily monitored point of entry to the internal networks. No internal services are exposed to the outside, preventing most security risks in the first place. Once connected to the VPN, resources on the internal networks are fully accessible, almost as if the computer were physically connected. You may already own a router or firewall that could serve as your new IPsec VPN gateway. More specific information can be found in your router's data sheet or manual. If the features listed include "IPsec VPN Tunnel" or "IPsec VPN Users" (e.g. "10 IPsec VPN Tunnels"), it is likely that an IPsec VPN can be set up on the device. If you do not yet own a router that is capable of providing VPN services, check out the list of popular devices on our interoperability website [LINK].
Absolute protection for your data: VPN Tracker 6 VPN Tracker 6, the market leading VPN client for Mac OS X, is designed to secure connections between Macs and remote networks. We have tested VPN Tracker with over 300 VPN gateway devices. To make setup even easier, we have written detailed configuration guides for many popular devices (http://www.vpntracker.com/interop). The latest algorithms and simplified certificate management protect important company information. Improved rekeying and Dead Peer Detection (DPD) ensure stable connections. And thanks to 64-bit compatibility and support for IPv6 addressing, VPN Tracker 6 is ready for the future today. If you have any questions about your VPN connection, the equinux Support Team is here to help (Verlinkung: http://www.vpntracker.com/support).