VPNs: How Private Are They?

CyberGatekeeper Remote Policy Enforcer keeps your users in compliance and your network secure.

No matter how big and bad a firewall sits between your corporate network and the Internet, you’re still vulnerable to attack from a most unexpected source—your remote secure connections.

InfoExpress, Inc. has introduced an interesting product to help plug this security hole: CyberGatekeeper Remote Policy Enforcer. Let’s examine how it works.

The CyberGatekeeper solution is a combo hardware/software package that consists of a hardware server, policy manager software and agent software. The CyberGatekeeper server evaluated was a 1U rack-mountable computer running Red Hat Linux on a Celeron processor. You don’t have to be a Linux expert to set up the server, as it simply boots directly into a DOS-type menu system where you can manually configure options or have the built-in wizards walk you through the configuration.

Product Information
CyberGatekeeper
$6,500
InfoExpress Inc.
650-623-0260 www.infoexpress.com

The multi-homed server is designed to sit between your corporate VPN server and the corporate network. All incoming VPN connections are routed through the server where their configurations are audited for policy compliance and, accordingly, are granted or denied access to the network. The outside interface uses a virtual IP address so it’s possible to have multiple CyberGatekeeper servers on the same segment for load-balancing purposes. The agent can only be installed on Windows operating systems.

When a remote computer establishes an inbound VPN connection, the agent collects information about the computer, including the operating system, vendor-specific anti-virus program, vendor-specific personal firewall program, as well as a slew of other security-related audits. This information is passed on to the CyberGatekeeper server where it’s compared against predefined policies (see the figure). If the audit fails, the remote computer is denied access. You can configure a custom message that’s passed onto the client to indicate why the failure occurred, and the user can then make the appropriate changes to bring his or her computer into compliance.

CyberGateKeeper
You can define comprehensive policies that require a minimum configuration in order for a remote computer to access the corporate network. (Click image to view larger version.)

I created a sample policy that required that the remote computer run Windows XP. When I made the VPN connection, the computer passed the audit, as it was running Windows XP. When I changed the policy to require a BlackIce Defender personal firewall, the audit failed and access was denied because I was using the built-in XP firewall. You can define multiple criteria for the policy based on required or desired minimum configurations. You can also audit the registry for specific values (for example, making sure the RUN ONCE value is blank, as many viruses and Trojans will modify this registry entry).

CyberGatekeeper is an innovative solution that can protect these entry points through audited compliance with corporate security policies. It’s easy to configure even for the non-Linux expert and doesn’t require that your remote employees be techies. When it comes to securing the corporate network, CyberGatekeeper offers a viable solution for keeping VPNs private.

About the Author

James Carrion, MCM R2 Directory, MCITP, MCSE, MCT, CCNA, CISSP has worked as a computer consultant and technical instructor for the past 16 years. He’s the owner of and principal instructor for MountainView Systems, LLC, which specializes in accelerated Microsoft Certification training.

Featured

  • Microsoft Dismantles RedVDS Cybercrime Marketplace Linked to $40M in Phishing Fraud

    In a coordinated action spanning the United States and the United Kingdom, Microsoft’s Digital Crimes Unit (DCU) and international law enforcement collaborators have taken down RedVDS, a subscription based cybercrime platform tied to an estimated $40 million in fraud losses in the U.S. since March 2025.

  • Sound Wave Illustration

    CrowdStrike's Acquisition of SGNL Aims to Strengthen Identity Security

    CrowdStrike signs definitive agreement to purchase SGNL, an identity security specialist, in a deal valued at about $740 million.

  • Microsoft Acquires Osmos, Automating Data Engineering inside Fabric

    In a strategic move to reduce time-consuming manual data preparation, Microsoft has acquired Seattle-based startup Osmos, specializing in agentic AI for data engineering.

  • Linux Foundation Unites Major Tech Firms to Launch Agentic AI Foundation

    The Linux Foundation today announced the creation of a new collaborative initiative — the Agentic AI Foundation (AAIF) — bringing together major AI and cloud players such as Microsoft, OpenAI, Anthropic and other major tech companies.