This document discusses secure remote access using Solaris Secure Shell. It describes network threats like password theft, session hijacking, and man-in-the-middle attacks. It explains how Solaris Secure Shell provides strong authentication, encryption, and session integrity to protect against these threats when accessing systems remotely. It also compares Solaris Secure Shell to IPsec and their suitability for different environments.