Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Stonesoft Seeks to Open Up VPNs

New SSL VPN products don't discriminate against mobile devices, non-employees

The problem with virtual private networks these days is that they are, well, a bit rigid. In most cases, you have to be an employee to get in. And in many cases, you have to be using a PC, and it has to be in a fixed location.

Stonesoft Corp. today is introducing a new series of products that are designed to help VPNs lighten up. The idea? To make it as easy for customers, partners, and highly mobile employees to use the VPN as it is for employees who stay in their offices all day.

With the new SSL VPN options under Stonesoft's StoneGate Secure Mobile Connectivity family, "employees, partners, and customers can easily access business data from anywhere at any time," the company says.

In the early days of firewalls and "perimeter security," companies built their VPNs "with a hard shell around the network, but nothing in the middle," says Klaus Majewski, product marketing manager at Stonesoft. The entry point to the VPN was highly secure, he observes, but once inside, users often had broad access to the entire network, with few restrictions.

As a result, most companies have kept their VPN access limited to employees or their most trusted partners, leaving no room for customers or occasional business partners.

"What we're doing here is putting a firewall on the outside, as was done in the past, but we're also putting IPS functionality in a trusted zone and adding centralized management of access," Majewski says. "With these products, you can create a DMZ that lets partners and customers get access to what they need, while still keeping them separated from the internal network used by employees."

Similarly, many "old school" VPNs do not work with the growing number of mobile devices currently on the market, including laptops, PDAs, smartphones, and other mobile equipment. Stonesoft's new SSL VPN offering lets users define several different access methods for a user, giving them access to many business applications -- or just one or two -- via a single portal, Majewski says.

"The [enterprise] can define which applications a user can access from the workplace, from home, or via a mobile device," Majewski explains. "Just as you can create different access profiles for different types of users, you can define which apps can be used by a certain type of device or from a particular location."

The more flexible options are possible because Stonesoft is combining its new SSL VPN products with its line of IPS, firewall, and security management tools, Majewski says. "You can tie in user groups or profiles that you may have developed in [Microsoft's] Active Directory or LDAP," he says. "Once you know what access you want to give a user, our products can enforce it."

It might be risky to push further into the SSL VPN market so soon after a giant like Microsoft has hammered a stake into the ground. But Stonesoft so far "hasn't seen much impact" from Microsoft among customers and prospects, Majewski says. "We may see some impact down the road, but right now, Microsoft doesn't have an SSL VPN client, so it's not a major competitor yet." (See Microsoft Takes Aim at Endpoint.)

The StoneGate line includes three SSL VPN options: the SSL 400, SSL 2000, and SSL 6000. Prices range from $3,800 to $128,000, depending on the number of users involved and the products and options selected, Majewski says.

— Tim Wilson, Site Editor, Dark Reading

  • Microsoft Corp. (Nasdaq: MSFT)
  • Stonesoft Corp.

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Leak Week: Billions of Sensitive Files Exposed Online
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
    Intel Issues Fix for 'Plundervolt' SGX Flaw
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    The Year in Security: 2019
    This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-17123
    PUBLISHED: 2019-12-13
    The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)
    CVE-2019-19774
    PUBLISHED: 2019-12-13
    An issue was discovered in Zoho ManageEngine EventLog Analyzer 10.0 SP1 before Build 12110. By running "select hostdetails from hostdetails" at the /event/runquery.do endpoint, it is possible to bypass the security restrictions that prevent even administrative users from viewing credential...
    CVE-2019-19790
    PUBLISHED: 2019-12-13
    Path traversal in RadChart in Telerik UI for ASP.NET AJAX allows a remote attacker to read and delete an image with extension .BMP, .EXIF, .GIF, .ICON, .JPEG, .PNG, .TIFF, or .WMF on the server through a specially crafted request. NOTE: RadChart was discontinued in 2014 in favor of RadHtmlChart. All...
    CVE-2019-19793
    PUBLISHED: 2019-12-13
    In Cyxtera AppGate SDP Client 4.1.x through 4.3.x before 4.3.2 on Windows, a local or remote user from the same domain can gain privileges.
    CVE-2019-19722
    PUBLISHED: 2019-12-13
    In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.