News

By modularizing the pieces of the VPN architecture, I should be able to easily apply the appropriate security best practices while balancing other administrative and support-related issues.
[1] Chuck Semeria, RFC 2547bis: BGP/MPLS VPN Fundamentals, 2000 http://www.juniper.net/solutions/literature/white_papers/200012.pdf ...
BitRipple and ExpressVPN team up to boost VPN speed, stability, and security with LT3 tech in the Lightway protocol.
Microsoft’s VPN architecture varies from other vendors that focus on IP Security (IPSec) as their core technology. The Microsoft method uses only standards-based technologies, hence its hybrid ...
Mesh VPN solutions check a lot of boxes, but as always there is a flip side of the coin. Businesses still operating in more of an old-school, on-prem architecture will likely have better options ...
For example: Global One-Hop Networks: By using a meshed optical VPN architecture to connect backbone routers, you can offer an IP service that has minimal network delay.
How to move from VPN to ZTNA (3 best practices) Advice for how to move from a legacy VPN architecture to a more modern zero-trust network access model. June 19, 2023 By Sean Michael Kerner Comment ...
Zero Trust architecture was created to solve the limitations of legacy security architectures. It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone ...