Solved

Remote Office Set-Up Concerns

Posted on 2015-01-17
3
119 Views
Last Modified: 2015-01-19
Dear,

we are setting up the remote office in another country and will be using the Wi-Fi from another company and then VPN into our network when users are in that office.

What do you see as IT Security issues here and what would you watch for? What would you set up to ensure IT Security? We are only sing their Wi-Fi and then VPNing into our office network.

I so far foresee the issue with the maintenance, when they are having their maintenance windows we might not be aware of this. I am trying to put down all the issues/concerns with this set up of shared network with someone else.

Thanks,
HelenIT
0
Comment
Question by:HelenIT
  • 2
3 Comments
 
LVL 94

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40555331
If the remote end uses a decent IPsec client application (e.g. NCP Secure Entry), then the VPN tunnel would be reasonably secure. It would be the same as working from a remote location anywhere.
0
 
LVL 94

Expert Comment

by:John Hurst
ID: 40557397
@HelenIT  - Thank you and I was happy to help.
0
 

Author Comment

by:HelenIT
ID: 40557412
:)
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question