Security considerations are always a major issue when deploying a remote access solution. Successful implementations must provide effective authentication and access control and care must also be taken to ensure that data is secured during transport over the network. Additional considerations arise when target devices are hosted as guests on remote networks administered by others. In such cases, particular care must be taken to ensure that your systems do not open the hosting network to outside threats.