Resources and insights

The latest industry news, interviews, technologies, and resources.

A New Approach to Remote Access

A New Approach to Remote Access

Remote work has been the subject of much debate for quite some time now. Are employees still productive working from home?Can team members still collaborate effectively online?Should employers trust employees to manage their own time? Studies and surveys have shown time and time again that the answer to all those questions is a resounding “yes” —

OpenVPN Team

4 minute read
Addressing the Hyperbole: OpenVPN Zero-Day Vulnerabilities

Addressing the Hyperbole: OpenVPN Zero-Day Vulnerabilities

Johan Draaisma

3 minute read
2FA vs. MFA: What’s the Difference?

2FA vs. MFA: What’s the Difference?

More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult

Krista Lyons

4 minute read
Introducing DNS Log for CloudConnexa

Introducing DNS Log for CloudConnexa

When it comes to cybersecurity, visibility is key. That’s why we’re excited to announce the beta release of DNS Log, a powerful new feature designed to give CloudConnexa administrators deeper insights into user activity, enhance security compliance, and strengthen threat prevention efforts.

Mollie Horne

4 minute read
Introducing Audit Log for CloudConnexa

Introducing Audit Log for CloudConnexa

We're excited to share that managing your CloudConnexa account just got simpler and more secure with the launch of Audit Log. This new feature is designed to provide IT administrators with the visibility and control they need to troubleshoot issues, ensure compliance, and streamline operations.

Mollie Horne

4 minute read
Secure Your Business: Access Control Policy Templates & Best Practices

Secure Your Business: Access Control Policy Templates & Best Practices

If you’re still in the startup stage, you may be tempted to allow open access for all resources to all employees. But as your team grows, your attack surface widens, making your business more appealing to bad actors. That’s where an access control policy template comes in.

Krista Lyons

13 minute read
How to Build a Zero Trust Architecture

How to Build a Zero Trust Architecture

Krista Lyons

11 minute read
OpenVPN announces Access Server is now available in the EC2 Image Builder on AWS

OpenVPN announces Access Server is now available in the EC2 Image Builder on AWS

December 5, 2024 — OpenVPN, leading provider of enterprise network security solutions, announced today that Access Server is available as a software component in the EC2 Image Builder console of Amazon Web Services (AWS). EC2 Image Builder is a fully-managed service that simplifies the customization, testing, distribution, and lifecycle management

OpenVPN Team

1 minute read
Creative MFA Setup Messages to Boost Employee Adoption

Creative MFA Setup Messages to Boost Employee Adoption

Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?

Krista Lyons

6 minute read
Announcing SCIM Support for CloudConnexa

Announcing SCIM Support for CloudConnexa

Managing users across platforms can be a time-consuming process, particularly when handling large teams or complex security environments. That’s why we’re excited to announce SCIM (System for Cross-domain Identity Management) support for CloudConnexa!

Mollie Horne

2 minute read
1 ...
2 3 4 5 6