FortiNet FortiGate is a firewall option with high integrability. It offers a variety of deployment options and next-gen firewall capabilities, including integration with IaaS cloud platforms and public cloud environments.
F5 BIG-IP software from Seattle-based F5 Networks is a load balancing and application protection solution suite available on cloud or via virtual editions, on a subscription or perpetual licensing basis. The BIG-IP suite of products supports a wide range of security and application…
GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. Developed with simplicity and ease of use in mind, GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and…
Avast offers their business class antivirus application, simply Avast Business Antivirus, which the vendor boasts as having a 100% malware detection rate and a centralized management platform to monitor threats network-wide across all connected endpoints, in editions for Windows,…
Barracuda CloudGen Firewalls provides a wide range of security and connectivity features, including web filtering, NAC and SSL VPN and other features for remote access, as well as protection as edge devices and IoT security.
F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.
The Check Point Quantum Security Gateway Next Generation Firewall is a tiered firewall product. The base model includes the core firewall services, and can be upgraded to include anti-bot/virus/spam and sandboxing capabilities.
Norton Secure VPN is designed to help secure private information like passwords, bank details and credit card numbers when using public Wi-Fi on a PC, Mac or mobile device. It is provided by NortonLifeLock (formerly Symantec).
VMware NSX is network virtualization technology.
San Francisco-based Juniper Networks developed Secure Access SSL VPN originally. The product is now offered as Ivanti Connect Secure, first by Pulse Secure (spun off in 2014), and now by Ivanti since their acquisition of Pulse Secure in December, 2020.
SonicWall Secure Mobile Access (SMA) appliances are secure access gateways which provide SSL VPN and remote access to any application or system via enforced secure granular access controls, context aware authorization, and advanced authentication.
Speedify is a new kind of bonding VPN designed from the ground up for speed, security, and reliability. The vendor says Speedify's bonding protocol lets it do things no other VPN can: switching between Wi-Fi and Cellular without breaking sockets, and bonding connections together…
Clario is a multiplatform cybersecurity solution with built-in 24/7 live chat. It helps users secure their devices and online identity from viruses, hacking, ID theft, or spying in real time. One Clario account protects up to three iOS, Android, or macOS devices.
Virtual Private Cloud (VPC) from Huawei Cloud enables users to create a secure, private, and isolated virtual network. The user can customize IP address ranges, subnets, security groups, and bandwidths, and assign Elastic IP (EIP) addresses.
NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN. NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the…
Brave Software’s privacy-oriented browser, combined with its blockchain-based digital advertising platform, aims to provide more secure access to the Web for users, publishers and advertisers. Their mission is to provide users a private, speedier Web experience with much longer battery…
Cisco Meraki Z3 Teleworker is an enterprise class firewall, VPN gateway and router. Each model offers five gigabit ethernet ports and wireless for connectivity. Each model is designed to securely extend the power of Meraki cloud managed networking to employees, IT staff, and executives…
AppGate SDP (software-defined perimeter) from Cyxtera Technologies headquartered in Addison is a zero trust network security product.
FatPipe MPVPN ffom FatPipe Networks in Salt Lake City aggregates two or more data lines of any type and in any combination to provide security, redundancy, and speed for VPNs. FatPipe MPVPN enables fault tolerance and reliability for VPN using technology to keep mission-critical…
What are Virtual Private Network (VPN) Solutions?
A virtual private network (VPN) is a service that securely connects an end user directly to a remote private network and its assets. The VPN hides the end user's IP address providing anonymity and privacy. Additionally, VPN connections are secured via encryption, preventing eavesdropping.
Virtual private networks provide several key benefits. The main benefit to organizations is the ability to securely send data from endpoint to endpoint since the encrypted data can only be decrypted by the recipient on the VPN. It also allows travelers to appear as if they are in their home region online. This helps them circumvent regional content locks and accessibility restrictions. It also allows businesses users to maintain privacy and confidentiality when not on their home or business network.
Virtual private networks can serve several purposes for organizations and their employees:
- Secure remote connections to, or transfers of, data, communications, etc, such as remote workers using sensitive company data
- Accessing region-restricted content, for employees who travel across different regulatory jurisdictions
- Providing anonymity when visiting websites and using public networks/WiFi
- Integrate with other security products for greater visibility into threats to your network and data
A subset of virtual private networks is the SSL VPN (Secure Sockets Layer Virtual Private Network). An SSL VPN provides a secure connection for remote users of applications and services via a web browser, without a need for additional desktop software. SSL VPN solutions can be deployed through appliances which may be used to deploy the VPN server. Standalone virtualized SSL VPN solutions are available, or SSL VPNs may be managed via a firewall.
Types of Virtual Private Networks
Virtual Private Network software’s core definition is a service that provides an encrypted tunnel between a main network and an “end user.” There are a variety of VPN setups and protocols, VPNs most commonly work in one of two ways:
- Remote Access VPN- a remote access VPN is an encrypted tunnel between an individual using a device, such as a laptop, smartphone, or workstation, to connect to the corporate network. The individual’s device is referred to as the “endpoint” the VPN connects to the main network. This setup is most relevant for securing individual remote workers
- Site-to-Site VPN- also referred to as “branch office VPN”, this encrypted connection is between a main corporate network or headquarters and remote branch office networks. The VPN tunnel is established between two VPN network devices, such as VPN routers. This setup is most relevant for organizations that need to securely connect entire office networks with each other.
There are a number of theoretically “free” VPN products available. These are usually targeted towards small scale or personal use. However, these VPNs are able to sell the data that users send over the VPN. Free options will also offer less reliability and bandwidth, and they will likely have fewer global server options.
B2B users, especially businesses with more than a few employees, should leverage a paid product instead. Paid VPNs will offer much better privacy, security, and support options. They are also less likely to sell users’ data to third parties, although buyer should verify this with each vendor.
When comparing different virtual private networks, consider these factors:
- Reliability: Consider how reliable each VPN is, especially at scale. For example, will the VPN impact your traffic or connectivity? VPNs, if not properly deployed/managed, can interfere with permissions set in other systems. Some may also restrict bandwidth or throttle traffic speeds given the lagtime to encrypt/decrypt traffic within a VPN and resourcing to send data across the network itself.
- Data Privacy: Some vendors retain the right to sell user data to third parties. For sensitive or personal data transmission, ensure that each vendor does not sell users’ data.
VPN pricing can vary depending on whether vendors offer it as a standalone product or part of a broader security package, like a firewall product. Standalone pricing is usually per device per month, with a floor around $5-10 per device.
There are some free virtual private network products available for very small businesses. However, free VPNs are primarily designed for individual use. Free VPNs usually come with limitations on the number of devices that can be used and enforce data caps that many businesses will quickly scale out of.