Network to Network
lScenario 1:
l Employees from two different regional offices want to synchronize sensitive data and work on the same project remotely
lScenario 2:
l System Administrator at Rutgers needs to add more computers to the computational cluster but has no more space in the room
lScenario 3:
l Financial consulting company needs to relay critical and market sensitive information to a private sector of a company and needs a secure way to do so