On Wed, Aug 18, 2010 at 11:52 PM, Raper, Jonathan - Eagle
<[email protected]> wrote:
> However, I would be interested to know what everyone
> uses for allowing vendors remote access and how that
> is logged/tracked in such a way that could be audited.

  We don't permit remote access by outside systems.  Period.

  If a vendor really wants to, we can ship them a company laptop for
temporary usage.  It uses our VPN and stays inside our network.

  Likely not viable for many orgs, but those are our rules.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to