Glossary
Related Terms
Virtual Private Network (VPN) is a technology in cybersecurity that creates a secure, encrypted connection between a device and a remote server over the internet.
VPNs are used to provide secure remote access to a private network, such as an organization's internal network, by encapsulating and encrypting all data transmitted between the device and the remote server. This helps to protect sensitive information from being intercepted by unauthorized users, such as hackers or eavesdroppers on public Wi-Fi networks.
These are the next evolution of VPNs to address some of the inherent disadvantages of VPNs. Some of them, like Twingate or GoTeleport, have made adjustments to their architecture to mitigate the major disadvantages.
However, NextGen VPNs are often still using the basic architecture of a VPN:
An Agent or Connector within the resource/network for outbound connections.
A Service or Access Gateway hosted or managed by the provider (it's how they make money).
A Client for users to access that connection.
This architecture is what subjects VPNs to the Perimeter Problem, slower latency, and service uptime issues.
There are two main types of VPNs:
Remote Access VPNs: These VPNs allow individuals to securely access an organization's internal network from a remote location.
Site-to-Site VPNs: These VPNs connect two or more private networks together over the public internet, allowing secure communication between the networks.
Corporations use VPNs for enabling remote access, allowing users to securely access an organization's internal network from remote locations. The fundamental idea is to tunnel through the organization's own perimeter system and treat a user as though they are already inside the network.
The disadvantages of VPNs include:
Slower internet speeds: Encrypting and decrypting data transmitted over a VPN can slow down internet speeds, especially for larger data transfers.
Limited server locations: Some VPN services may have a limited number of server locations, which can affect a user's ability to access certain content or services.
Complex setup: Setting up a VPN can be complex and requires technical knowledge, making it challenging for non-technical users.
Cost: VPN services can be expensive, especially for organizations looking to provide VPN access to a large number of users.
Compatibility issues: VPNs can cause compatibility issues with some software and devices, especially if the software or device does not support the VPN protocols used.
Security vulnerabilities: VPNs tend to have security vulnerabilities, especially if the VPN service does not implement strong encryption or use outdated protocols. Furthermore, a compromised VPN can open the organization to malicious access because the organization's networks are treating access from that VPN as trusted.
Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.
Company
Quicklinks
Stay Connected
Stay up to date with Pomerium news and announcements.