In this chapter, we discussed some of the technology options for the secure portal and identified some advantages and disadvantages of using each.