This presentation will discuss the reason why having unfettered access to a device is essential to assess the security posture of a product and to perform timely incident response, as remarked by NSA guidance on remote access VPNs. Compare the approaches taken by three vendors, demonstrating the efforts required to assess the security of the devices, together with the vulnerabilities found.