If Secure Remote Access is the logical extension of a private network to another location, and if organizations assume that the ‘other location’ is a WiFi network that is either compromised or malicious, how much protection do enterprise remote access products provide against common threats they could reasonably expect to encounter? This session will present research to inform secure approaches.