Remove Encryption Remove Network Security Remove VPN
article thumbnail

A new threat to network security has surfaced (and it’s not the quantum computer)

Juniper

Official Juniper Networks Blogs A new threat to network security has surfaced (and its not the quantum computer) The quantum computing era has officially arrived, which is a good thing. However, the bad news is that this new era also brings the ability to break current VPN encryption algorithms.

article thumbnail

Cato CTRL Threat Brief: CVE-2024-3661 – VPN Vulnerability (“TunnelVision”)

CATO Networks

On May 6 th , 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. This encrypted packet is then encapsulated within the VPN protocol layer, allowing secure communication with the VPN server.

VPN 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Rethinking Enterprise VPN Solutions: Designing Scalable VPN Connectivity

CATO Networks

Many companies turned to their existing VPN infrastructure, beefing up the terminating appliances in the datacenter with additional capacity to support hundreds or thousands of new work from home (WFH) users. However, VPN infrastructure isnt designed to support an entire workforce.

VPN 52
article thumbnail

Moving Beyond Remote Access VPNs

CATO Networks

What is a Remote Access VPN and How Does it Work? A remote access virtual private network (VPN) is a solution designed to securely connect a remote user to the enterprise network. A remote access VPN creates an encrypted tunnel between a remote worker and the enterprise network.

VPN 52
article thumbnail

MPLS, VPN Internet Access, Cloud Networking or SD-WAN? Choose Wisely

CATO Networks

SD-WAN directs WAN traffic across encrypted Internet tunnels. This provides the most basic security needed to send traffic over a public network. An enterprise-grade network security stack built into the backbone extends security everywhere without the need to deploy additional security products.

MPLS 52
article thumbnail

Types of Remote Access Technologies for Enterprises

CATO Networks

Many companies that already offered VPN services to a small group of remote workers scurried to extend those capabilities to the much larger workforce sequestering at home. With a VPN, all communication between the user and the VPN is encrypted. There is no need to set up regional hubs or VPN concentrators.

VPN 52
article thumbnail

Remote Access VPNs are a Short-Term Solution

CATO Networks

Digital transformation initiatives, cloud adoption, remote work, and other factors all have a significant impact on where corporate IT assets are located and how corporate networks are used. VPNs are ill-suited to meeting modern business needs and will only become less so in the future.

VPN 52