Remote Access
OpenVPN Partners with ZEDEDA to Connect and Secure Your Edge Network
OpenVPN is excited to share that we’ve teamed up with ZEDEDA, a provider of edge orchestration and management solutions, to address the complexities of securing Operational Technology (OT). This innovative partnership has created a powerful security solution that integrates content filtering, intrusion detection, and intrusion prevention, enabling organizations to seamlessly deploy and manage a zero-trust […]
September 11, 2024
Read More
Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage
There was no break from cyber threats this summer, and no shortage of breaches and attacks that left companies reeling. From the headline-garnering outage impacting Microsoft devices due to CrowdStrike to encryption guidelines for quantum computing, we’ve compiled what you need to know about July and August’s cybersecurity news. Microsoft outage due to CrowdStrike During […]
August 28, 2024
Read More
On Demand: Secure Remote Access for Hybrid and Remote Tech Workers
OpenVPN recently held a webinar to help tech companies that embrace the remote or hybrid workforce keep access to their assets and data safe and secure. We know in tech you have to move fast and that sometimes means missing webinars you’d hoped to catch. If you missed the webinar, you can still catch the […]
July 31, 2024
Read More
How Identity and Access Management Fits Into Zero Trust
“Never trust, always verify.” If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive […]
July 23, 2024
Read More
How to Build a Zero Trust Architecture
$4.45 million. That’s the average cost of a data breach in 2023, according to IBM’s annual Cost of Data Breach report, representing an increase of 15% over the last three years. Cyberattacks are changing, and traditional techniques and over hyped new AI technologies are not enough. Your business needs a security model that has been […]
July 16, 2024
Read More
Not a Flip of the Switch: How IT Managers Implement Zero Trust Models
Over the last few years, zero trust, and more specifically zero trust network access (ZTNA) has rapidly gained popularity. In fact, according to a recent study published by ESG, the vast majority of survey respondents reported using ZTNA either extensively (46%) or for certain use cases (40%) in support of zero trust at their organizations. […]
June 18, 2024
Read More
Watch on Demand: Strengthening Remote Access in Healthcare with Zero Trust
Recently, OpenVPN hosted a webinar for those in the healthcare industry to learn more about how zero trust can keep their patient data safe. If you missed the webinar, you can still catch the replay here. Network Security Challenges in Healthcare Healthcare organizations, especially those with remote employees or providers who travel between multiple sites, […]
June 12, 2024
Read More
April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH
The second quarter of 2024 is proving busy for bad actors, specifically for those targeting network security providers like VPNs and Secure Shell (SSH). From mid-January to March 2024, CISA published several advisories regarding VPN vendors, releasing an emergency directive in early February after 1700 organizations fell victim to a campaign by an unknown Chinese […]
April 30, 2024
Read More
Cisco Sunsetting AnyConnect Secure Mobility Client Version 4.x: Switch to OpenVPN Alternative
On March 31, 2024, Cisco announced end-of-life dates for their Cisco AnyConnect Secure Mobility Client 4.x. If your business is a Cisco client, this may be a good time to re-evaluate your VPN solution before transitioning to their Cisco Secure Client software. What Cisco AnyConnect customers should know In a recent announcement from Cisco, the […]
April 16, 2024
Read More
Harnessing Zero Trust Network Access (ZTNA) to Manage Shadow IT
As new technology, new risks, and new tools surface faster than most teams can keep up with, organizations are experiencing a surge in shadow IT. Employees, usually in an effort to get their work done more efficiently, resort to using unauthorized applications and services outside of the approved IT infrastructure. While this trend may arise […]
April 2, 2024
Read More