Month: April 2016
Poor user adoption is a nightmare shared by most IT project managers. The idea of spending countless dollars and hours of labor only to go live with a new service or tool that lacks total end-user adoption is enough to keep anyone awake at night. Such a fear is prevalent even with the implementation of software as important to the integrity of a network as password managers. One common reason behind this lack of user adoption is not discovering the needs of the end-user early enough in the project lifecycle.
Across all industries, IT initiatives are often co-led by members of that industry such as medical or engineering staff, so that IT project managers can better tailor their solutions to the end-user needs. That actually is one of the characteristics that make password manager implementations so effective- if the value is properly communicated to the end-user around how this technology will make it easier for all end-users to conduct business, adoption becomes a foregone conclusion. In banking, or retail, the fact that password managers can open the end-user to systems that otherwise would require another level of authentication is enough of a “What’s in it for me” (WIFM) to virtually guarantee a level of partnership between the line of business and information technology departments.Read More
One of the big use cases for having an SSL VPN is the ability to grant secure access to internal company websites to your remote users.
This is generally done by reverse proxying and when it works right it’s a great way of securing your internal sites that you would rather not have directly facing the internet.
However, it can be a challenge to successfully set up a reverse proxy that works perfectly and to do so often requires significant effort from either the poor admin who is trying to set up the resource, or the support team from the company supplying the VPN system. In my 9 years of working on SSL VPN technology, I would guess that up to 80% of all support was related to getting these proxied resources working.
Sometimes you get lucky as the VPN vendor may have templated a particular resource (like Microsoft Sharepoint for example) which has already had the hard work done by their development team with all the config required, although the point here is that it was still probably difficult to generate this.
Sometimes your internal website is very simple with nice static links that’s easy to catch and rewrite. Most of the time though you run into problems.Read More