Monday, August 26, 2019

Word of the Day: VPN (virtual private network)

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | August 26, 2019
VPN (virtual private network)

A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet. A VPN uses tunneling protocols to encrypt data at the sending end and decrypt it at the receiving end. To provide additional security, the originating and receiving network addresses are also encrypted.

VPNs are used to provide remote corporate employees, freelance workers and business travelers with access to software applications hosted on proprietary networks or web sites that are geographically restricted. To gain access to a restricted resource through a VPN, the user must provide one or more authentication factors, such as a password, security token or biometric data.

VPN apps are also commonly used by individuals who want to protect data transmissions on their mobile devices or visit web sites that are geographically restricted. Secure access to an isolated network or website through a mobile VPN should not be confused with private browsing, however. Private browsing does not involve encryption; it is simply an optional browser setting that prevents identifiable user data, such as cookies, from being collected and forwarded to a third-party server.

VPN protocols

The benefit of using VPN protocols is that they ensure an appropriate level of security to connected systems when the underlying network infrastructure alone cannot provide it. There are several different protocols used to secure and encrypt users and corporate data. They include:

  • IP security (IPsec)
  • Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
  • Point-To-Point Tunneling Protocol (PPTP)
  • Layer 2 Tunneling Protocol (L2TP)
  • OpenVPN

 

Types of VPNs

Remote access VPN - connects clients to a VPN gateway server on the organization's network. This type of VPN usually relies on either IP Security (IPsec) or Secure Sockets Layer (SSL) to secure the connection

Site-to-site VPN - uses a gateway device to connect an entire network in one location to a network in another location. End-node devices in the remote location do not need VPN clients because the gateway handles the connection. Most site-to-site VPNs use the IPsec protocol. Continue reading...

Quote of the Day

 
"The future of VPN services reflects the industry's trend toward software networking, evident in developments like SD-WAN and public cloud. The need for flexible technology is a main driver." - Robert Sturt

Learning Center

 

The future of VPN will reflect the need for flexibility
The growth of SD-WAN and public cloud are shaping the future of VPN technology, highlighting the demand for flexibility and usability. Learn how changes in software and security capabilities will affect VPN services.

SD-WAN vs. VPN: How do they compare?
While software-defined WAN and internet VPN services share similarities, enterprises need to look at SD-WAN vs. VPN to determine which technology might prove more beneficial and align with business requirements.

What VPN alternatives should enterprises consider using?
VPN alternatives are being considered as serious VPNs vulnerabilities are discovered in popular products. Learn the risks and how companies can benefit.

Are there security benefits to using a site-to-site VPN?
A site-to-site VPN can offer some security benefits to organizations that may not need a traditional VPN. Here's what enterprises should know.

Site-to-site VPN vs. remote-access VPNs: What's the difference?
Learn about the protocols supporting site-to-site VPN vs. remote-access VPNs. Both serve important roles, so enterprises should consider the factors most important to them before selecting the approach they may want to use.

Quiz Yourself

 
When we learned that our relaxed approach to VoIP security made us more vulnerable to corporate espionage, we decided it was time to take a different ____.
a. tack
b. tact

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: