Virtual Private Network (VPN)
-
Upload
devolutions -
Category
Technology
-
view
590 -
download
2
Transcript of Virtual Private Network (VPN)
Knowledge Base
Why use aVirtual Private Network (VPN)?
Why use a VPN?
The typical representation of a person accessing
the Internet looks like this:
Why use a VPN?
The typical representation of a person accessing
the Internet looks like this:
Why use a VPN?
The typical representation of a person accessing
the Internet looks like this:
Using a device (such has a computer) to submit
information on internet in order to reach a remote
service.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
But the cloud is composed of a multitude of devices
allowing interconnectivity.
Each device sends traffic along, following routing
tables that may change over time.
Why use a VPN?
Any device that intervenes in the connection
obviously sees the information that travels through it.
Why use a VPN?
Any device that intervenes in the connection
obviously sees the information that travels through it.
Why use a VPN?
Any device that intervenes in the connection
obviously sees the information that travels through it.
Any of these devices could have been hijacked by
a malicious user capturing the information as it
travels.
Why use a VPN?
Any device that intervenes in the connection
obviously sees the information that travels through it.
Any of these devices could have been hijacked by
a malicious user capturing the information as it
travels.
Why use a VPN?
For web traffic as portrayed in our example, SSL
encryption exists to make all information unreadable
by both parties agreement on an encryption key.
Why use a VPN?
For web traffic as portrayed in our example, SSL
encryption exists to make all information unreadable
by both parties agreement on an encryption key.
Why use a VPN?
For web traffic as portrayed in our example, SSL
encryption exists to make all information unreadable
by both parties agreement on an encryption key.
But some protocols and services do not have that
alternative. Another solution was needed.
Why use a VPN?
In an office environment, the solution was to create a
tunnel through which all information was encrypted.
Why use a VPN?
In an office environment, the solution was to create a
tunnel through which all information was encrypted.
Why use a VPN?
In an office environment, the solution was to create a
tunnel through which all information was encrypted
Why use a VPN?
In an office environment, the solution was to create a
tunnel through which all information was encrypted.
Why use a VPN?
In an office environment, the solution was to create a
tunnel through which all information was encrypted.
Why use a VPN?
In an office environment, the solution was to create a
tunnel through which all information was encrypted.
VPN allows users to safely use any protocol (even if
they still are vulnerable to snooping) by encrypting
and decrypting at both ends of the tunnel.
Visit us at: devolutions.net
Devolutions is the creator of
Remote Desktop Manager,
a tool to manage remote
access technologies,
credentials, and VPNs.