VPN or ‘Virtual Private network’ is exactly what it states – it is a private and virtual connection to your corporate network. While it is easy and comfortable to make use of free and open Wi-Fi in open spaces to access corporate resources, it is highly susceptible to different types of attacks(stealing your password might be the simplest one) VPNs enable professionals to access corporate resources in a safe and secure manner.
So, how does a VPN really work?
A VPN makes use of the existing infrastructure such as the Internet, LAN or WAN to connect to an organization. The data that is to be sent is encrypted on the sender’s end and decrypted on the receiver’s end. Encrypting makes sure none of the data that travels along the Internet is seen in public. There are three simple types of VPNs – they are the IPSec VPN, SSL VPN and the mobile VPN.
What are the advantages of using a VPN?
- The most obvious reason of using a VPN is the cost factor. Using the public infrastructure such as the Internet to make secure connection is very appealing to many business enterprises.
- The use of VPN further reiterates two of the tenets of the information security triad or the CIA triad (confidentiality and integrity). The ‘Confidentiality’ of the information that is transmitted through the VPN is safeguarded. The ‘Integrity’ of the data, which means that the data must not be tampered with in transit, is also preserved. And lastly the authentication factor is also taken care of. ‘A’uthentication is making sure that the information has indeed originated from the place it is supposed to have been sent from
- The last advantage is that VPNs can easily be deployed.
Disadvantages of VPN:
In spite of the advantages listed, VPNs do come with a few disadvantages. Some of them are :
- The additional overhead that is generated by making use of encryption algorithms is one disadvantage.
- Troubleshooting the VPN is another disadvantage that has to be given certain thought before installing it.
- And the Internet’s availability is the most important requirement for the VPN to function. If it is unavailable, then the VPN cannot function
So, now where can I find the best VPN services?
According to a report from techrader.com, the best VPN services are offered by:
In conclusion, acquiring a VPN for a business enterprise entirely depends on the requirements for the organization. If there are more “road warriors” than on site employees, it would be a good option to invest in one.
This post is for alphabet ‘V’ of the BlogchatterA2Z challenge…the other alphabets are listed below:
- ‘A’ – Asset
- ‘B’ – What is Blockchain ?
- ‘C’ – Caesar cipher
- ‘D’ – Detroit
- ‘E’ – Empowering women
- ‘F’ – Four concepts of Blockchain
- ‘G’ – Go green
- ‘H’ – Hyperledger Composer
- ‘I’ – India
- ‘J’ – Java 101
- ‘K’ – Kulambu
- ‘L’ – List of Information security certifications
- ‘M’ – Michigan
- ‘N’ – NIST publications
- ‘O’ – Object oriented programming
- ‘P’ – Palm tree fruit
- ‘Q’ – Quiet
- ‘R’ – For the love of ‘Reading’….
- ‘S’ – Security
- ‘T’ – Time
- ‘U’ – Usage of Information security