Remove Application Remove Network Security Remove VPN
article thumbnail

A new threat to network security has surfaced (and it’s not the quantum computer)

Juniper

Official Juniper Networks Blogs A new threat to network security has surfaced (and its not the quantum computer) The quantum computing era has officially arrived, which is a good thing. However, the bad news is that this new era also brings the ability to break current VPN encryption algorithms.

article thumbnail

SDP/ZTNA vs. VPN

CATO Networks

Once Upon a VPN … In todays challenging reality, remote access has become a basic requirement for businesses of all kinds, sizes, and locations. An enterprises ability to shift to a work-from-anywhere model instantly, securely, and at scale, will determine how it will weather the COVID-19 crisis. Is VPN still relevant?

VPN 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Rethinking Enterprise VPN Solutions: Designing Scalable VPN Connectivity

CATO Networks

Many companies turned to their existing VPN infrastructure, beefing up the terminating appliances in the datacenter with additional capacity to support hundreds or thousands of new work from home (WFH) users. However, VPN infrastructure isnt designed to support an entire workforce.

VPN 52
article thumbnail

Alternatives to VPN for Remote Access

CATO Networks

The most common enterprise remote access technology is Virtual Private Networking (VPN). A VPN client is installed on the users devices laptops, smartphones, tablets to connect over the Internet to a server in the headquarters. However, VPNs were built to enable short duration connectivity for a small subset of the users.

VPN 52
article thumbnail

Firewall as a Service and your biggest network security challenge

CATO Networks

We recently held a webinar focused on educating network professionals about Firewall as a Service (FWaaS). At the beginning of this webinar, we asked the audience what is your biggest challenge running distributed network security today? MPLS also has other challenges like the complexity of deployment and provisioning.

article thumbnail

Cato CTRL Threat Brief: CVE-2024-3661 – VPN Vulnerability (“TunnelVision”)

CATO Networks

On May 6 th , 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. This encrypted packet is then encapsulated within the VPN protocol layer, allowing secure communication with the VPN server.

VPN 52
article thumbnail

Announcing Complete Azure Observability for Kentik Cloud

Kentik

Kentik customers move workloads to (and from) multiple clouds, integrate existing hybrid applications with new cloud services, migrate to Virtual WAN to secure private network traffic, and make on-premises data and applications redundant to multiple clouds – or cloud data and applications redundant to the data center.

Cloud 105