VPNs

May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security 

Summer isn’t the only thing that’s heating up. So far in 2024, there have been at least 20 major cyber attacks, according to Tech Radar, with at least six of those happening in May alone.  From late April through early June, threat actors have exploited vulnerabilities in VPN products as well as server software and […]
June 18, 2024
Read More

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

The second quarter of 2024 is proving busy for bad actors, specifically for those targeting network security providers like VPNs and Secure Shell (SSH). From mid-January to March 2024, CISA published several advisories regarding VPN vendors, releasing an emergency directive in early February after 1700 organizations fell victim to a campaign by an unknown Chinese […]
April 30, 2024
Read More

Announcing Access Server Support for Docker

At OpenVPN, we are constantly on the lookout for customer requests and suggestions to make our products better. In response to some of those requests, we’re pleased to announce official support for Access Server on Docker — users no longer need to depend on third-party providers or open-source versions and can instead use our official […]
April 16, 2024
Read More

Cisco Sunsetting AnyConnect Secure Mobility Client Version 4.x: Switch to OpenVPN Alternative

On March 31, 2024, Cisco announced end-of-life dates for their Cisco AnyConnect Secure Mobility Client 4.x. If your business is a Cisco client, this may be a good time to re-evaluate your VPN solution before transitioning to their Cisco Secure Client software.  What Cisco AnyConnect customers should know In a recent announcement from Cisco, the […]
April 16, 2024
Read More

Cost-Effective Site-to-Site Networking Solutions for Your Business

Cost-effective site-to-site networking is within reach, even for the smallest businesses. Here, we walk you through your options, from VPNs and MPLS to SD-WAN, to help you choose a solution that works for your business — and your budget.
March 5, 2024
Read More

Guide to Choosing a Business VPN for Secure Remote Access

In the first installment of our series, we discussed the reasons for a small or midsize business to choose a point solution over a platform, or bundled solution, including flexibility and scalability. Once you’ve made the decision to move forward with a point solution, you may be asking yourself where to begin with finding the right solutions for your business where it currently stands and where you want to be in the future.  In this post, we spoke to our team of experts to share how to choose the right solutions for your business – be they a best-of-breed point solution or a bundled platform.
February 27, 2024
Read More

VPN, ZTNA, SASE, SSE, SDP – What Exactly Does Your Small Business Need?

The growth of cloud services makes it easier than ever for small and mid-size businesses (SMBs) to create information technology (IT) infrastructure without breaking their budgets. But like all businesses, SMBs face an increasing number of threats. Security Intelligence reports that, in 2019, “... 43% of attackers went after small businesses, and in 2021, 60% […]
February 20, 2024
Read More

Partner Tips: Getting Client Buy-In for ZTNA

When it comes to implementing a zero-trust architecture, getting client buy-in is essential. Here, we offer a few tips and tricks to help your clients embrace ZTNA little by little, while making your job as their MSP easier.
January 9, 2024
Read More

How To Deploy a Connector on CloudConnexa

Are you feeling a little lost when it comes to deploying connectors on CloudConnexa? We've got you covered.
November 22, 2023
Read More

Zero Trust With OpenVPN Protocol for Network Access = Our ZTNA-Capable Solutions

CloudConnexa is now CloudConnexa® — learn more here. What is Zero Trust Network Access (ZTNA)? According to Gartner, "Zero trust network access (ZTNA) is a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust […]
October 31, 2023
Read More