Resources and insights
The latest industry news, interviews, technologies, and resources.

OpenVPN Freezes Out the Competition with Winter 2025 G2 Awards
OpenVPN has been consistently recognized by G2 in 2024 in the Business VPN category, and continues to enjoy recognition from the tech review giant to kick off 2025.
Krista Lyons
4 minute read

Understanding OpenVPN Access Server’s Two Free Connections
When you launch OpenVPN Access Server, you can connect immediately with two free connections. How does it work? Read on to understand how you can get started testing your setup before needing to purchase a license.
OpenVPN Team
3 minute read

Phishing Awareness Training: A Guide for IT Managers
Phishing is nothing new. In fact, phishing was one of the first social engineering attack methods on the internet, dating back as early as the 1990s via AOL email addresses. The problem with phishing awareness is that, while you might be familiar with the threats, reasons, and methods of attack, the employees in your organization may not be quite
Krista Lyons
9 minute read

ZTNA for Small and Mid-Size Businesses: Where to Begin
What started as a nebulous new cybersecurity term defined by Forrester analyst John Kindervag in 2010 has morphed and changed through the years, but the intrigue has stayed the same with 61% of businesses claiming to have a zero trust strategy in 2024. As a result, product after product promises that if you give the right amount of money to the
Krista Lyons
6 minute read

Cybersecurity Awareness Training for Employees
Many employees have the best of intentions, but even the smallest mistakes can lead to big problems. That is why regular cybersecurity training for employees is so important. There are several key areas where you should focus your company’s training efforts. Here are the types of cybersecurity training for employees that should be conducted
OpenVPN Team
6 minute read

Watch on Demand: Strengthening Remote Access in Healthcare with Zero Trust
Krista Lyons
6 minute read

VPN Hardware Vs. VPN Software
Basic research reveals that aVPNis essential to ensuring overall network security. Setting up a VPN gives you a secure tunnel online, and allows you to create point-to-point or site-to-site connections. It also allows you to securely connect routed or bridge configurations for remote access facilities, and you link your users through your
OpenVPN Team
5 minute read