The ability for enterprises to have employees get behind company firewalls through their Android devices has been a desire for businesses for some time now. With the introduction of Ice Cream Sandwich, the latest version of the Google-made smartphone operating system, that’s now looking possible. Cisco recently released a preview version of its Anyconnect Android app back in late February, which is currently available on the Android Marketplace. While the app may not be as advanced as a virtual private network, it is still pretty advanced.
But while every smartphone app “preview” is sure to be a little buggy, it’s safe to say that as far as telecommunications related releases in recent memory are concerned, the Anyconnect app for Android Ice Cream Sandwich takes the cake. While it shows promise for usability at some point, it doesn’t appear to be in the new future, and especially not in time for when they surely plan on releasing the final version.
For a business, providing the most fool-proof security system available to your network isn’t always feasible. Information security systems are often incredibly expensive, and difficult to set up and maintain. However, not spending the extra time and money to have the security that you need is a huge risk.
Having your information hacked into can literally put you out of business. Some of the biggest and most detrimental consequences to having your business’ information hacked include:
Once you put something on the web, you can bet that it will forever live on – no matter how hard you try to erase it. If you send something through email that you would rather not have the public know, it could easily be made public if your account is hacked. If you keep private documents online, they could easily be made public if your computer is hacked.
Virtual Private Networks (VPN’s) allow for users to bridge network connections using the Internet. Such connections and setups are routinely employed by businesses in order to allow employees traveling outside of the office to connect to the same servers and services that users would typically only have access to if they were sitting inside of the building. However, if you are running a Linux server of your own (either a remote VPS or dedicated box), you can employ the same mechanism to connect securely to your server. Why would you want to do this? For one, savvy users can better lock-down otherwise public services to bind to “internal” VPN IP addresses so that only users connected and authenticated to the VPN can use them. Moreover, if you have excess allowances of bandwidth on your server, you can take advantage of the VPN to route all of your Internet traffic through your server. There are various reasons why you would want to do this, including connecting to regionally restricted services and maintaining a static IP address.
Now, I personally recommend setting up OpenVPN if you are looking for a more secure setup. However, users looking for a simpler option will definitely want to look into the Point-to-Point Tunneling Protocol (PPTP) daemon package available on pretty much every well-supported major Linux distribution as the setup process is much easier.
In my previous post about the new 2TB Apple Time Capsule where I unboxed it, I briefly explained what the Time Capsule actually is and promised a more in depth review as soon as I got a chance to actually use it. So as promised here is a more in depth review of Apple’s new Time Capsule.
The Time Capsule is a wireless router (802.11n) which contains a hard drive for easy backup in conjunction with the OS X application Time Machine. The new Time Capsule’s come in a 1TB model for $299 and a 2TB model for $499. It comes with 1 Gbit WAN port and 3 Gbit LAN ports (I wish it had 4) directly on the device itself as well as a single USB port for a network printer and/or an external hard drive which would essentially turn into a NAS. The design of the Time Capsule is very sleek. I like the fact it has no external antenna’s.