Resources and insights

The latest industry news, interviews, technologies, and resources.

Understanding clustering with OpenVPN Access Servers

Understanding clustering with OpenVPN Access Servers

Clustering: creating a cluster of Access Servers What is clustering? You can think of it like a team of Access Servers delivering privacy and security to your users. They work together to manage connections and they remove the single point of failure from a traditional setup through one Access Server. If you need to increase the availability and

OpenVPN Team

6 minute read
April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

Krista Lyons

8 minute read
A New Approach to Remote Access

A New Approach to Remote Access

Remote work has been the subject of much debate for quite some time now. Are employees still productive working from home?Can team members still collaborate effectively online?Should employers trust employees to manage their own time? Studies and surveys have shown time and time again that the answer to all those questions is a resounding “yes” —

OpenVPN Team

4 minute read
Addressing the Hyperbole: OpenVPN Zero-Day Vulnerabilities

Addressing the Hyperbole: OpenVPN Zero-Day Vulnerabilities

Johan Draaisma

3 minute read
2FA vs. MFA: What’s the Difference?

2FA vs. MFA: What’s the Difference?

More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult

Krista Lyons

4 minute read
Introducing Audit Log for CloudConnexa

Introducing Audit Log for CloudConnexa

We're excited to share that managing your CloudConnexa account just got simpler and more secure with the launch of Audit Log. This new feature is designed to provide IT administrators with the visibility and control they need to troubleshoot issues, ensure compliance, and streamline operations.

Mollie Horne

4 minute read
Secure Your Business: Access Control Policy Templates & Best Practices

Secure Your Business: Access Control Policy Templates & Best Practices

If you’re still in the startup stage, you may be tempted to allow open access for all resources to all employees. But as your team grows, your attack surface widens, making your business more appealing to bad actors. That’s where an access control policy template comes in.

Krista Lyons

13 minute read
How to Build a Zero Trust Architecture

How to Build a Zero Trust Architecture

Krista Lyons

11 minute read
OpenVPN announces Access Server is now available in the EC2 Image Builder on AWS

OpenVPN announces Access Server is now available in the EC2 Image Builder on AWS

December 5, 2024 — OpenVPN, leading provider of enterprise network security solutions, announced today that Access Server is available as a software component in the EC2 Image Builder console of Amazon Web Services (AWS). EC2 Image Builder is a fully-managed service that simplifies the customization, testing, distribution, and lifecycle management

OpenVPN Team

1 minute read
Creative MFA Setup Messages to Boost Employee Adoption

Creative MFA Setup Messages to Boost Employee Adoption

Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?

Krista Lyons

6 minute read
1 ...
3 4 5 6 7