VPN (3)

Zero Trust With OpenVPN Protocol for Network Access = Our ZTNA-Capable Solutions
OpenVPN Cloud is now CloudConnexa® — learn more here.
Rohit Kalbag
8 minute read

VPN for Work from Home: A Beginner’s Guide to Innovations and Security Trends
A little less than half of U.S. companies have continued to expand their remote and hybrid work options — all while threat actors have used the years following the pandemic to fine-tune their attack methods.
Krista Lyons
11 minute read

VPN Kill Switch for OpenVPN Connect Now Available
OpenVPN strives to deliver reliable VPN server connections. But no internet-based service, not even OpenVPN, can operate without an occasional failure. Whether it’s an unreliable internet connection or ISP, VPN server problems, or an issue with antivirus or firewall settings — dropped connections happen. And when VPN connection failures happen,
OpenVPN Team
5 minute read

Why VPNs and Zero Trust Network Access Are Not Mutually Exclusive
There are some voices within the IT and cybersecurity communities that insist VPNs are outdated, insecure, and insufficient for the network security demands facing today’s businesses. They instead advocate for zero trust network access (ZTNA) as the silver bullet for every IT and cybersecurity professional’s secure remote access woes. Theirs is a
OpenVPN Team
7 minute read

Cybersecurity For Tech Companies
5.3 trillion U.S. dollars. That’s the 2022 estimated spending for the global information technology (IT) industry. Given that the Verizon 2020 Data Breach Investigations Report (DBIR) found 86% of data breaches are motivated by financial gain, it’s easy to see why cybercriminals target the tech industry. According to the NTT 2020 Global Threat
OpenVPN Team
9 minute read

Restricted Internet Access: Available Now With CloudConnexa
A walled garden, in internet terms, “... is an environment that controls the user's access to network-based content and services.” A walled garden is used to keep users from exploring outside the walls and to protect against malware, phishing, and other cyber threats. According to TechTarget, “Although a walled garden does not always prevent users
OpenVPN Team
3 minute read

VPN Audits — A Primer and a Security Audit Checklist
Popularity of VPNs (virtual private networks) has grown with the popularity, and necessity, of remote workers using outside-the-firewall remote access, often on public WiFi, to tap into internal networks. Like anyone selling a product or service, VPN service providers make bold claims and promises. But should you trust them? How can you identify
OpenVPN Team
5 minute read

VPN's Role in SASE
In 2019, the research firm Gartner coined the term “secure access service edge” (SASE) to describe “ … network security functions (such as SWG, CASB, FWaaS and ZTNA), with WAN capabilities (i.e., SDWAN) to support the dynamic secure access needs of organizations.” The idea that remote users can have secure access, no matter where they work, became
OpenVPN Team
4 minute read

How a VPN Helps with Network Security
Once upon a time, network security meant servers on premise. A firewall would guard business data as internet traffic traveled in and out of the network. But today? Modern business doesn’t operate strictly on-prem.
OpenVPN Team
9 minute read

Who is Access Server For?
Who is Access Server For? OpenVPN Access Server was created for small-to-medium sized businesses, but also has the capacity to scale into the thousands. So no matter the size of your organization, and no matter what your end goals are for your business, Access Server can help you get where you want to go.
OpenVPN Team
7 minute read