Today, users in remote locations or sites commonly use VPN as a means to access host systems. VPN access means persistent connections and users become “virtual members” of the host system which can create security vulnerabilities. In many cases these remote users are not organic company employees but business partners or affiliates such as clinics or doctor offices. Organizations may not have control over these end user systems creating the potential for threats and network vulnerabilities. VPN connections also consume IT support resources and can be relatively expensive and complex to implement.