Secure Remote Access (2)

Understanding clustering with OpenVPN Access Servers
Clustering: creating a cluster of Access Servers What is clustering? You can think of it like a team of Access Servers delivering privacy and security to your users. They work together to manage connections and they remove the single point of failure from a traditional setup through one Access Server. If you need to increase the availability and
OpenVPN Team
6 minute read

A New Approach to Remote Access
Remote work has been the subject of much debate for quite some time now. Are employees still productive working from home?Can team members still collaborate effectively online?Should employers trust employees to manage their own time? Studies and surveys have shown time and time again that the answer to all those questions is a resounding “yes” —
OpenVPN Team
4 minute read

Announcing SCIM Support for CloudConnexa
Managing users across platforms can be a time-consuming process, particularly when handling large teams or complex security environments. That’s why we’re excited to announce SCIM (System for Cross-domain Identity Management) support for CloudConnexa!
Mollie Horne
2 minute read

Crosstalk Solutions Shares Their Access Server Tutorial
Crosstalk Solutions is known for their expertise in networking and VoIP solutions, and their reputation for creating informative, high-quality technical content makes them the perfect partner for this video. Whether you’re an IT professional setting up Access Server for the first time or an experienced user looking to fine-tune your configuration,
Heather Walters
3 minute read

Why Secure Remote Access is a Win for Everyone
Remote work is the new normal for countless businesses today, and secure remote access is a critical component of a robust cybersecurity strategy. Secure remote access allows your hybrid or remote workforce to work from anywhere, at any time, on any device without compromising the security of your organization's data and systems. Here, we discuss
OpenVPN Team
9 minute read

Why VPNs and Zero Trust Network Access Are Not Mutually Exclusive
There are some voices within the IT and cybersecurity communities that insist VPNs are outdated, insecure, and insufficient for the network security demands facing today’s businesses. They instead advocate for zero trust network access (ZTNA) as the silver bullet for every IT and cybersecurity professional’s secure remote access woes. Theirs is a
OpenVPN Team
7 minute read

VPN's Role in SASE
In 2019, the research firm Gartner coined the term “secure access service edge” (SASE) to describe “ … network security functions (such as SWG, CASB, FWaaS and ZTNA), with WAN capabilities (i.e., SDWAN) to support the dynamic secure access needs of organizations.” The idea that remote users can have secure access, no matter where they work, became
OpenVPN Team
4 minute read

What is SAML?
What is SAML? SAML, which stands for Security Assertion Markup Language, is an open standard for exchanging authentication and authorization data between an identity provider and a service provider.
OpenVPN Team
3 minute read

VPN for Work from Home: A Beginner’s Guide to Innovations and Security Trends
A little less than half of U.S. companies have continued to expand their remote and hybrid work options — all while threat actors have used the years following the pandemic to fine-tune their attack methods.
Krista Lyons
11 minute read
Understanding how split tunneling works with OpenVPN Access Server
A basic, personal virtual private network (VPN), such as Private Tunnel, routes the user’s traffic to the internet through an encryptedVPNtunnel. Someone might use the personal VPN service to protect sensitive data on public WiFi or to get around geographic content restrictions. Business VPNs are different, however. While companies may provide
Rohit Kalbag
3 minute read