I'm looking to contrast using Securemote and Citrix ICA for external
VPN access. Does anyone have first hand experience they can share or
recommend web sites or news groups that would have this information.
One of the primary area's of concern is how secure the client is that
is accessing the internal network. Has it been documented anywhere
where a client's VPN or ICA session has been 'high jacked' and used to
gain access to internal resources?
TIA
Dave Pristavec
Enterprise Network Manager
[EMAIL PROTECTED]
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================