Statements (55)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Virtual_Private_Network
|
| gptkbp:alternativeTo |
gptkb:IPsec_VPN
|
| gptkbp:canBe |
gptkb:Java_Virtual_Machine
gptkb:software gptkb:industrial_equipment cloud-based two-factor authentication single sign-on client-based clientless deployed on-premises integrated with Active Directory integrated with Kerberos integrated with LDAP integrated with OAuth integrated with RADIUS integrated with SAML used on desktops used on laptops used on mobile devices |
| gptkbp:canBeBypassedBy |
firewalls
|
| gptkbp:canLog |
user activity
|
| gptkbp:enables |
secure communication
|
| gptkbp:encryption |
data in transit
|
| gptkbp:enforcedBy |
access policies
|
| gptkbp:operatesIn |
application layer
|
| gptkbp:provides |
remote access
site-to-site connectivity access to email servers access to file shares access to internal web applications access to intranet resources |
| gptkbp:requires |
gptkb:SSL_certificate
authentication |
| gptkbp:supportedBy |
gptkb:OpenVPN
gptkb:Pulse_Secure gptkb:Cisco_AnyConnect gptkb:Fortinet_FortiClient gptkb:SonicWall_Mobile_Connect split tunneling full tunneling |
| gptkbp:supports |
web-based access
client-based access |
| gptkbp:supportsProtocol |
gptkb:SSL
TLS |
| gptkbp:usedBy |
enterprises
remote workers |
| gptkbp:vulnerableTo |
man-in-the-middle attacks
SSL vulnerabilities |
| gptkbp:bfsParent |
gptkb:F5,_Inc.
gptkb:VMware_NSX gptkb:ASA_firewalls gptkb:Cisco_AnyConnect |
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
SSL VPN
|