On Wed, Aug 18, 2010 at 11:52 PM, Raper, Jonathan - Eagle <[email protected]> wrote: > However, I would be interested to know what everyone > uses for allowing vendors remote access and how that > is logged/tracked in such a way that could be audited.
We don't permit remote access by outside systems. Period. If a vendor really wants to, we can ship them a company laptop for temporary usage. It uses our VPN and stays inside our network. Likely not viable for many orgs, but those are our rules. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
