
Network to Network
lScenario 1:
l Employees from two different regional
offices want to
synchronize sensitive data and work on the same project remotely
lScenario 2:
l System Administrator at Rutgers needs
to add more computers
to the computational cluster but has no more space in the room
lScenario 3:
l Financial consulting company needs to
relay critical and
market sensitive information to a private sector of a company and needs a secure way to
do so