The remote access domain opens applications and resources to remote users. Doing so has the potential for exposing an organization’s internal environment to more threats. Because this domain commonly connects remote users to your environment using an untrusted WAN, you must ensure the controls protect your internal resources. Selecting, deploying, and managing the right security controls can provide efficient and secure access across an untrusted WAN. To help with that challenge, an organization should consider emerging alternatives that would help their businesses enable more cost-effective but safe remote access. In this week’s discussion, elaborate upon an emerging alternative that an organization could implement. In response to your peers, be sure to build upon their ideas while also discussing an improvement or alternative to them.

Be sure to post an initial, substantive response by Thursday at 11:59 p.m. MST and respond to two or more peers with substantive responses by Sunday at 11:59 p.m. MST. A substantive initial post answers the question presented completely and/or asks a thoughtful question pertaining to the topic. Substantive peer responses ask a thoughtful question pertaining to the topic and/or answer a question (in detail) posted by another student or the instructor.