I'm looking to contrast using Securemote and Citrix ICA for external 
     VPN access.  Does anyone have first hand experience they can share or 
     recommend web sites or news groups that would have this information.  
     One of the primary area's of concern is how secure the client is that 
     is accessing the internal network.  Has it been documented anywhere 
     where a client's VPN or ICA session has been 'high jacked' and used to 
     gain access to internal resources?
     
     TIA
     
     Dave Pristavec
     Enterprise Network Manager
     [EMAIL PROTECTED]



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to