Resources and insights
The latest industry news, interviews, technologies, and resources.

Understanding clustering with OpenVPN Access Servers
Clustering: creating a cluster of Access Servers What is clustering? You can think of it like a team of Access Servers delivering privacy and security to your users. They work together to manage connections and they remove the single point of failure from a traditional setup through one Access Server. If you need to increase the availability and
OpenVPN Team
6 minute read

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH
Krista Lyons
8 minute read

A New Approach to Remote Access
Remote work has been the subject of much debate for quite some time now. Are employees still productive working from home?Can team members still collaborate effectively online?Should employers trust employees to manage their own time? Studies and surveys have shown time and time again that the answer to all those questions is a resounding “yes” —
OpenVPN Team
4 minute read

2FA vs. MFA: What’s the Difference?
More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult
Krista Lyons
4 minute read

Introducing Audit Log for CloudConnexa
We're excited to share that managing your CloudConnexa account just got simpler and more secure with the launch of Audit Log. This new feature is designed to provide IT administrators with the visibility and control they need to troubleshoot issues, ensure compliance, and streamline operations.
Mollie Horne
4 minute read

Secure Your Business: Access Control Policy Templates & Best Practices
If you’re still in the startup stage, you may be tempted to allow open access for all resources to all employees. But as your team grows, your attack surface widens, making your business more appealing to bad actors. That’s where an access control policy template comes in.
Krista Lyons
13 minute read

OpenVPN announces Access Server is now available in the EC2 Image Builder on AWS
December 5, 2024 — OpenVPN, leading provider of enterprise network security solutions, announced today that Access Server is available as a software component in the EC2 Image Builder console of Amazon Web Services (AWS). EC2 Image Builder is a fully-managed service that simplifies the customization, testing, distribution, and lifecycle management
OpenVPN Team
1 minute read

Creative MFA Setup Messages to Boost Employee Adoption
Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?
Krista Lyons
6 minute read