In our first foray into this subject, we learned about the types of techniques LogMeIn uses and how they can circumvent security controls. Given these tools make the network perimeter more permeable than security teams may realize, it is important to know who is initiating the connection, and where the communicating devices reside - especially if this isn’t the approved remote access solution. In the original post of this series, I set the stage for why remote access capabilities should be analyzed more carefully.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |