virtual private network (vpn)

Post on 19-Jul-2015

590 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Knowledge Base

Why use aVirtual Private Network (VPN)?

Why use a VPN?

The typical representation of a person accessing

the Internet looks like this:

Why use a VPN?

The typical representation of a person accessing

the Internet looks like this:

Why use a VPN?

The typical representation of a person accessing

the Internet looks like this:

Using a device (such has a computer) to submit

information on internet in order to reach a remote

service.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Any of these devices could have been hijacked by

a malicious user capturing the information as it

travels.

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Any of these devices could have been hijacked by

a malicious user capturing the information as it

travels.

Why use a VPN?

For web traffic as portrayed in our example, SSL

encryption exists to make all information unreadable

by both parties agreement on an encryption key.

Why use a VPN?

For web traffic as portrayed in our example, SSL

encryption exists to make all information unreadable

by both parties agreement on an encryption key.

Why use a VPN?

For web traffic as portrayed in our example, SSL

encryption exists to make all information unreadable

by both parties agreement on an encryption key.

But some protocols and services do not have that

alternative. Another solution was needed.

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

VPN allows users to safely use any protocol (even if

they still are vulnerable to snooping) by encrypting

and decrypting at both ends of the tunnel.

Visit us at: devolutions.net

Devolutions is the creator of

Remote Desktop Manager,

a tool to manage remote

access technologies,

credentials, and VPNs.

top related