VPN (2)

Cloud Networking and Cloud Security Go Hand in Hand
According to VMWare, “Cloud networking is a type of infrastructure where network capabilities and resources are available on-demand through a third-party service provider that hosts them on a cloud platform. The network resources can include virtual routers, firewalls, and bandwidth and network management software, with other tools and functions
OpenVPN Team
4 minute read

Leverage Your VPN For Attack Surface Reduction
Take a moment and mentally tally up all the different technological resources your business utilizes on a day to day basis. You probably have plenty of computers, cell phones, and internet connected printers in the office. Your employees likely use a corporate email account, specific websites, and SaaS (software-as-a-service) tools to get work
OpenVPN Team
4 minute read

Creative MFA Setup Messages to Boost Employee Adoption
Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?
Krista Lyons
6 minute read

Biggest Generative AI Security Trends in 2024
“Hey AI bot, write me a blog post about the biggest generative AI security trends in 2024, and make it sound human.”
Krista Lyons
11 minute read

Announcing Device Posture for CloudConnexa
At OpenVPN, we’re always working to improve our products and elevate our customers’ experience. We are excited to announce the Beta availability of Device Posture for CloudConnexa. This feature adds an extra layer of security to your network by ensuring that only devices meeting your organization’s security and compliance standards can access your
Mollie Horne
4 minute read

Announcing Location Context Policy for CloudConnexa
At OpenVPN, we’re always looking for ways to make our products and our customers’ experience better. We are excited to announce the beta release of Location Context Policy for CloudConnexa, a powerful new feature that allows you to create network access policies based on the geographic location of the user attempting to connect to your
Mollie Horne
3 minute read

Announcing IPsec Support for CloudConnexa
At OpenVPN, we are constantly on the lookout for customer requests and suggestions to make our products better. We are thrilled to announce the beta release of IPsec VPN connections for CloudConnexa! This highly anticipated feature allows you to seamlessly connect your on-prem or cloud-based networks to CloudConnexa, enhancing both connectivity
Mollie Horne
3 minute read

Crosstalk Solutions Shares Their Access Server Tutorial
Crosstalk Solutions is known for their expertise in networking and VoIP solutions, and their reputation for creating informative, high-quality technical content makes them the perfect partner for this video. Whether you’re an IT professional setting up Access Server for the first time or an experienced user looking to fine-tune your configuration,
Heather Walters
3 minute read

On Demand: Setting Up Access Server: The Cake is NOT a Lie
If you believe the only way to have a simple setup is with a portal to another world, we’re here to tell you the piece of cake promise is NOT a lie. It can be done in less than 30 minutes, and we’re showing you how.
Krista Lyons
4 minute read

Partner Tips: Getting Client Buy-In for ZTNA
Zero trust network access (ZTNA) has been around since 2010 and rose in popularity in 2021 when the National Security Agency (NSA) and the Biden Administration released their guidelines and recommendations. But just because ZTNA has been around for a while and has data to back why it should be used doesn’t necessarily mean MSPs have automatic
Krista Lyons
7 minute read