-
What Is a VPN? A Complete Guide to Virtual Private Networks
- What is the difference between personal and business VPNs?
- How does a VPN work?
- What does a VPN hide?
- What are VPNs used for?
- How secure are VPNs?
- Why do you need a VPN?
- What are the primary features of a VPN?
- What are the benefits of a VPN?
- What are the different types of VPNs?
- What are the different types of VPN protocols?
- What are the alternatives to a VPN for secure remote access?
- How to set up a VPN step-by-step
- How to choose the right VPN for your needs
- Comparing VPNs with other security technologies
- What is the history of VPNs?
- VPN FAQs
-
Secure Remote Access | Protect Remote Employees from Cyberthreats
- Ivanti VPN Vulnerability: What You Need to Know
- SSL VPN vs. IPSec: What Are the Differences?
- IPsec vs. OpenVPN: What Are the Differences?
- How to Set Up a Virtual Private Network (VPN)?
- How Does a VPN Work?
-
What Is the History of VPN?
- 1960s–1970s: The Dawn of ARPANET and the Need for Connectivity Across Different Networks
- 1980s: TCP/IP and the Public's Introduction to the Internet
- 1990s: The Rise of the Web and Emergence of Early VPN Technologies
- 2000s: VPNs Evolve Alongside Cybersecurity Challenges
- 2010s: A Decade of Digital Transformation
- 2019–Present: The Response to Remote Work and Limitations of VPNs
- VPN History FAQs
- What Is a Cloud VPN?
-
Replacing Legacy VPN and NAC Solutions with a Next-Generation Network Security Client for Endpoints
- SoftEther vs. OpenVPN: What Are the Differences?
- What Are the Different Types of VPN?
- What Are the Different Types of VPN Protocols?
- VPN Alternatives for Remote Access
- What Are the Benefits of a VPN (Virtual Private Network)?
- VPN Security: Are VPNs Safe and Secure?
- VPC vs. VPN vs. VPS: What Are the Differences?
- What Is a Business VPN? Understand Its Uses and Limitations
- What is a Data Center?
- What Is a Double VPN?
- What Is a Remote Access VPN?
- What Is a Site-to-Site VPN?
-
What Is a VPN Concentrator?
- How Does a VPN Concentrator Work?
- Why Use a VPN Concentrator?
- VPN Concentrator Benefits
- VPN Concentrator Disadvantages
- VPN Concentrator Encryption Protocol Types
- VPN Concentrator vs. VPN Router
- VPN Concentrator vs. Site-to-Site VPN
- VPN Concentrator vs. IPsec Encryption
- VPN Concentrator vs. VPN Client
- VPN Concentrator FAQs
- What Is a VPN Gateway?
- What Is a VPN Tunnel?
- What Is an SSL VPN?
- What Is IKE (Internet Key Exchange)? | IKE Meaning
- What Is IKEv2 (Internet Key Exchange version 2)?
- What Is IPsec?
- What Is L2TP (Layer 2 Tunnel Protocol)?
- What Is Network Segmentation?
- What Is OpenVPN?
- What Is PPTP (Point-to-Point Tunneling Protocol)?
- What is Quality of Service?
-
What Is SoftEther (Software Ethernet)?
- How Does the SoftEther VPN Protocol Work?
- What Is a SoftEther VPN?
- SoftEther VPN Architecture
- How Secure Is the SoftEther VPN Protocol?
- Pros and Cons of SoftEther
- How to Use SoftEther VPN
- Comparing SoftEther with Other Protocols
- The History of SoftEther
- Does SoftEther Work In Enterprise Environments?
- SoftEther FAQs
- What Is SSTP (Secure Socket Tunneling Protocol)?
- What Is WireGuard?
- WireGuard vs. OpenVPN | What Are the Differences?
What is Remote Access?
Remote access is the ability to connect to a computer, network, or system from a distant location. It allows users to access files, run applications, and manage systems without being physically present. This is commonly used by employees working from home, IT administrators managing systems offsite, and businesses supporting clients remotely.
Why is Remote Access Important?
Remote access allows end users to access resources on the corporate network from a distant location. The most common function of remote access is to enable employees who are traveling or telecommuting to connect to the company network and access resources such as internal applications, intranet, mail services, and file sharing.
In the past, remote access was a service that companies provided through dial-up modems. In order to avoid the expense of long distance or toll-free phone lines, companies started adopting remote access methods that took advantage of public networks over the internet. The evolution of internet technology led to a parallel growth in remote access with more adaptive and secure options.
Virtual Private Networks
The predominant method of providing remote access is via a Virtual Private Network (VPN) connection. Normally, a user has no expectation of privacy on a public network, as their network traffic is viewable by other users and system administrators. A VPN creates a “tunnel” that passes traffic privately between the remote network and the user. The tunnel protects the traffic and keeps it safe from being intercepted or tampered with.
VPNs are commonly implemented using the protocols IPsec or SSL. Both are popular, but the main difference is the layer of network traffic they secure. An IPsec connection requires client software (provided by a third party or by the operating system), whereas an SSL VPN connection can be accessed through a web browser. However, due to the growing complexity of running code in a web browser and the diversity of browser platforms, many SSL VPN products now use client software as well.
SSL VPNs may also provide remote access through a proxy. Proxy-based portals require remote users to connect to an intermediary server (the SSL Portal VPN) where they are granted access to applications and resources permitted from the network administrators. A proxy serves as an intermediary between the application and the user, providing more access control but also introducing problems with application compatibility.
Emerging Remote Access Model
An emerging model of remote access provides the benefit of a tunnel for broad application support while retaining strong control over access to applications through the next-generation firewall security policy. This approach allows administrators to safely enable remote user activity and access on the network. Combining the benefits from earlier implementations, this model is the most secure and practical remote access solution available today.