Resources and insights

The latest industry news, interviews, technologies, and resources.

Stay Secure with Always-on VPN Support in OpenVPN Connect for Android

Stay Secure with Always-on VPN Support in OpenVPN Connect for Android

At OpenVPN, we’re always working to enhance security and ease of use for our customers. That’s why we’re excited to announce that OpenVPN Connect now supports Always-on VPN in Android. With this update, Android users can now ensure that their devices automatically connect to their VPN after boot-up and remain securely connected at all times.

Mollie Horne

3 minute read
SaaS Application Security Checklist & Best Practices

SaaS Application Security Checklist & Best Practices

For small and medium-sized companies, SaaS services offer the convenience of on-demand access to essential tools, without the need to build complex internal systems.

OpenVPN Team

8 minute read
Introducing DNS Log for CloudConnexa

Introducing DNS Log for CloudConnexa

When it comes to cybersecurity, visibility is key. That’s why we’re excited to announce the beta release of DNS Log, a powerful new feature designed to give CloudConnexa administrators deeper insights into user activity, enhance security compliance, and strengthen threat prevention efforts.

Mollie Horne

4 minute read
PCI Security Policy & Template: Ensure Compliance, Reduce Breach Risks, and Build Customer Trust

PCI Security Policy & Template: Ensure Compliance, Reduce Breach Risks, and Build Customer Trust

Compliance with the Payment Card Industry Data Security Standard (PCI DSS) can feel daunting for smaller organizations, especially those with limited time and resources. However, a PCI security policy is the backbone of compliance efforts. It ensures consistent practices to protect sensitive cardholder data and build customer trust.

OpenVPN Team

8 minute read
Introducing Access Server Pay-As-You-Go (PAYG) on AWS Marketplace

Introducing Access Server Pay-As-You-Go (PAYG) on AWS Marketplace

The challenge: rigid licensing and complex scalability Previously, IT teams deploying Access Server on AWS faced limited flexibility in licensing. AWS-billed AMI instances required businesses to choose from a fixed set of concurrent connection options. If their needs changed, they had to provision a new instance, migrate users, and update

Mollie Horne

3 minute read
Complimentary Gartner® Report: Emerging Tech: Universal ZTNA Drives Secure Access Consolidation

Complimentary Gartner® Report: Emerging Tech: Universal ZTNA Drives Secure Access Consolidation

By now, you likely have a ZTNA strategy. But what about universal ZTNA? Universal zero trust network access refers to the use of ZTNA for on-premises and remote users, with no distinction made as to the user’s location. Using the principle of least privilege, regardless of location, universal ZTNA allows secure remote access anywhere — and

Krista Lyons

4 minute read
Cloud Security Policy 101: Protect Your Data in the Cloud

Cloud Security Policy 101: Protect Your Data in the Cloud

Small and mid-market businesses (SMBs) have increasingly embraced the cloud for application usage, infrastructure management, and data storage. According to Techopedia, “By 2025, 30 percent of SMBs will shift half of their core workloads to the cloud to drive business agility and future resilience.” Such a meteoric rise in cloud adoption has

Krista Lyons

6 minute read
How to Secure Your Hybrid Workplace Technology

How to Secure Your Hybrid Workplace Technology

As most know, hybrid work has become a permanent fixture for many businesses. In fact, according to recent research from Gallup, as many as 55% of workers in the US have hybrid work arrangements. This flexibility presents the best of both worlds — employees can enjoy the flexibility of occasional remote work while employers can harness in-person

OpenVPN Team

8 minute read
Revolutionizing Secure Resource Sharing with CloudConnexa™ AppHub

Revolutionizing Secure Resource Sharing with CloudConnexa™ AppHub

Mollie Horne

2 minute read
Zero Trust and VPNs: NOT Mutually Exclusive

Zero Trust and VPNs: NOT Mutually Exclusive

Never trust, always verify. This is the basic premise behind a zero trust network. Zero trust can be an important piece of your layered cybersecurity, requiring strict identification to access a network. You don’t trust a connection without verifying it carefully. Many people in the tech industry have tried to paint the picture that zero trust

OpenVPN Team

7 minute read