Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios

How to Accelerate the Design and Implementation of Secure Remote Access During Times of Crisis

Published March 2020

secure-remote-access-best-practices-in-disaster-recovery-scenarios

In times of crisis organizations can excel in quick resource mobilization but not necessarily rational decision-making. Quick choices are made that seemingly address an immediate challenge but also lead to long-term unforeseen consequences.

This Check Point white paper provides guidance for network security administrators on the capabilities of, and methods of implementing secure access for remote employees. The document highlights the Check Point’s remote access solutions and their applicability to different use cases. Also covered are network design considerations and high-level implementation methods.