What's a Mobile VPN?
The Key to a Successful Mobile Deployment
The foundation of a successful mobile deployment is a Mobile VPN (virtual private network) software that provides mobile workers with secure, reliable, remote access to network resources and information from virtually anywhere. Only a Mobile VPN is designed to deal with the unique challenges associated with mobile computing such as wireless security, performance and roaming.
Traditional VPNs are not Built for the Mobile Environment
One of the weaknesses of the original Internet protocol (TCP/IP) is that it does not include a native means for ensuring the authenticity and privacy of data as it passes over a public network. To address this weakness, VPN technologies were developed that would validate the identity of and encrypt the data sent between two or more systems on the Internet.
These conventional VPN technologies, including PPTP, IPsec and SSL work great for users who connect from stationary devices (a home PC over residential broadband, a laptop over a hotel LAN, or even a PDA at a wi-fi hot spot), as they use the IP address to identify the device at the far end of the tunnel. But once that device is in motion, physical connectivity, point of network attachment, and IP address are all likely to change. A conventional VPN simply cannot adapt to these changes.
The network tunnel is disrupted, causing application sessions to disconnect, time out, fail, or even the computing device itself to crash. This often forces the user to restart the communication from scratch, possibly having lost work or data transmission that was in process at the time of the disruption.
Add these drops up, factor in the time and productivity lost, and you start to see how challenging a mobile technology deployment can become without the right tools.
Choosing a Mobile VPN
As with any software, there are multiple options on the market to choose from. When choosing a mobile VPN, the following key features should be considered:
True Application Persistence: The ability to sustain application sessions, even through suspend-and-resume cycles and loss of connectivity
Standards-Based Security: Supports two-factor authentication, device authentication, FIPS 140-2 AES encryption, NSA Suite B encryption and the ability to quarantine remote devices
Centralized Management Console: Browser-based console that generates views into connected devices and detailed reporting
Wireless Performance Optimization:provide the ability to automatically reduce network consumption and improve throughput and application responsiveness, particularly over these cellular networks