Featured
TikTok Ban: What It Means and Why a VPN Might Not Be Enough
At OpenVPN, we understand that this situation has sparked renewed interest in VPNs as a potential solution, and we want to provide clarity and guidance. While a VPN can be a powerful tool for enhancing privacy and accessing restricted content, navigating a TikTok ban involves complexities beyond simply using a VPN. Here’s a breakdown of the
Heather Walters
3 minute read
OpenVPN Freezes Out the Competition with Winter 2025 G2 Awards
OpenVPN has been consistently recognized by G2 in 2024 in the Business VPN category, and continues to enjoy recognition from the tech review giant to kick off 2025.
Krista Lyons
4 minute read
Phishing Awareness Training: A Guide for IT Managers
Phishing is nothing new. In fact, phishing was one of the first social engineering attack methods on the internet, dating back as early as the 1990s via AOL email addresses. The problem with phishing awareness is that, while you might be familiar with the threats, reasons, and methods of attack, the employees in your organization may not be quite
Krista Lyons
9 minute read
ZTNA for Small and Mid-Size Businesses: Where to Begin
What started as a nebulous new cybersecurity term defined by Forrester analyst John Kindervag in 2010 has morphed and changed through the years, but the intrigue has stayed the same with 61% of businesses claiming to have a zero trust strategy in 2024. As a result, product after product promises that if you give the right amount of money to the
Krista Lyons
6 minute read
2FA vs. MFA: What’s the Difference?
More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult
Krista Lyons
4 minute read
Secure Your Business: Access Control Policy Templates & Best Practices
If you’re still in the startup stage, you may be tempted to allow open access for all resources to all employees. But as your team grows, your attack surface widens, making your business more appealing to bad actors. That’s where an access control policy template comes in.
Krista Lyons
13 minute read
OpenVPN announces Access Server is now available in the EC2 Image Builder on AWS
December 5, 2024 — OpenVPN, leading provider of enterprise network security solutions, announced today that Access Server is available as a software component in the EC2 Image Builder console of Amazon Web Services (AWS). EC2 Image Builder is a fully-managed service that simplifies the customization, testing, distribution, and lifecycle management
OpenVPN Team
1 minute read
Creative MFA Setup Messages to Boost Employee Adoption
Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?
Krista Lyons
6 minute read
Announcing Device Posture for CloudConnexa
At OpenVPN, we’re always working to improve our products and elevate our customers’ experience. We are excited to announce the Beta availability of Device Posture for CloudConnexa. This feature adds an extra layer of security to your network by ensuring that only devices meeting your organization’s security and compliance standards can access your
Mollie Horne
4 minute read
Announcing Location Context Policy for CloudConnexa
At OpenVPN, we’re always looking for ways to make our products and our customers’ experience better. We are excited to announce the beta release of Location Context Policy for CloudConnexa, a powerful new feature that allows you to create network access policies based on the geographic location of the user attempting to connect to your
Mollie Horne
3 minute read