What is split tunneling? Here are the pros and cons

When remote-access VPNs are heavily used, traffic to and from the internet can tax the corporate internet connection as well as the security measures. That’s where split tunneling comes in. Split tunneling is when only the traffic destined for resources at the corporate site go through the VPN. The rest is…

Global VPN use exploded in March

With millions of people working from home, the coronavirus outbreak has seen global VPN demand surge. Demand for commercial virtual private networks in the U.S. jumped by 41% between March 13 and March 23, according to research from Top10VPN.com, a VPN research and testing company in the U.K.VPNs were already…

Colleges expand VPN capacity, conferencing to answer COVID-19

Colleges that moved from on-campus classrooms to remote learning due to COVID-19 had to quickly upgrade networks to support new VPN connections for remote access. Fortunately, many online-learning platforms rely on cloud-based applications that don’t put additional strain on campus networks.For example, The College of the Holy Cross in Worcester,…

Recent VPN hacks reveal transparency issues within the industry and its supply chain

Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were 3 million reports of identity theft alone in 2018.Even though these threats —…

The VPN is dying, long live zero trust

The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today’s world of digital business.To read this article in full, please click…

How to prevent IPv6 VPN breakout

Enterprises unaware of the role IPv6 plays on remote users’ devices run the risk that these machines might access banned sites despite using VPNs that are meant to restrict what they access.This hole stems from the fact that some of these remote-access VPNs are configured to inspect and apply security…