Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:43 AM

Aventail Predicts Remote Access Surge

Aventail announced the results of a survey of 604 IT decision-makers

SEATTLE -- Leading SSL VPN provider Aventail today announced the results of a survey of 604 IT decision-makers confirming that secure remote access usage will continue to increase rapidly over the next 12 months. Key drivers of this trend include the increased usage of mobile devices and wireless LANs, more robust disaster recovery planning, and the overriding need for users to be both productive and secure in each of these use cases. Security continues to be the #1 challenge facing IT organizations, with the increasing use of mobile devices a close #2. Organizations will also continue to expand secure remote access usage in the more traditional use cases of teleworkers and home computer users. Survey respondents rated “security” as the top criteria in making a purchasing decision for their new secure remote access solutions, with “easy to use” and “easy to install and manage” also extremely important.

Survey participants were managers or senior executives in IT, networking, and/or security departments, and came from organizations that were researching SSL VPNs. Organizations were of all sizes, with over half having more than 1000 employees. Additionally, most organizations already had significant experience with secure remote access solutions, with more than 50% of them already supporting at least some remote access for teleworkers, traveling employees, home computer users, wireless LAN users, and mobile device users.

Top findings included:

  • Secure remote access usage:

  • 77% of organizations support secure remote access for teleworkers today

  • Secure remote access usage will increase significantly over the next 12 months, when 85% of organizations will support secure remote access from mobile devices, 82% from a wireless LAN, and 75% for disaster recovery.

  • Secure remote access purchasing criteria:

  • 98% of respondents rated “security” as an extremely or very important criteria in making a decision to purchase a secure remote access solution, making it the #1 criterion.

  • “Ease of use” and “easy to install and manage” were also top purchasing criteria, with 89% and 84% or respondents, respectively, rating them as extremely or very important.

  • “Well-known brand” was deemed not to be an important criterion, with only 44% of respondents rating it as extremely or very important.

Aventail Corp.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).
PUBLISHED: 2021-06-16
Cross Site Scripting (XSS) in Moodle 3.10.3 allows remote attackers to execute arbitrary web script or HTML via the "Description" field.
PUBLISHED: 2021-06-16
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" t...
PUBLISHED: 2021-06-16
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes.
PUBLISHED: 2021-06-16
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify ...