<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VPN Archives - Bunker Seguridad Electrónica S.L.</title>
	<atom:link href="https://bunkerseguridad.es/en/news/vpn/feed/" rel="self" type="application/rss+xml" />
	<link>https://bunkerseguridad.es/en/news/vpn/</link>
	<description>Manufacturing and distribution of perimeter detection systems in Europe.</description>
	<lastBuildDate>Wed, 30 Jun 2021 10:26:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://bunkerseguridad.es/en/wp-content/uploads/2021/02/cropped-Bunker-seguridad--32x32.png</url>
	<title>VPN Archives - Bunker Seguridad Electrónica S.L.</title>
	<link>https://bunkerseguridad.es/en/news/vpn/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Virtual Private Networks (VPN) for secure remote working from any location</title>
		<link>https://bunkerseguridad.es/en/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/</link>
					<comments>https://bunkerseguridad.es/en/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/#respond</comments>
		
		<dc:creator><![CDATA[Prácticas 1]]></dc:creator>
		<pubDate>Sat, 26 Jun 2021 09:00:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[News & Events]]></category>
		<category><![CDATA[KBC Networks]]></category>
		<category><![CDATA[Remote working]]></category>
		<category><![CDATA[Secure data transmission]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://bunkerseguridad.es/en/?p=1007</guid>

					<description><![CDATA[<p>Well-being is closely linked with health and productivity. Numerous researchs show that employees who are in good mental, physical and emotional health are more likely to deliver optimal performance at work. The need to establish secure and reliable environments is becoming more important, so that employees can be connected to the corporate network from any [&#8230;]</p>
<p>The post <a href="https://bunkerseguridad.es/en/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/">Virtual Private Networks (VPN) for secure remote working from any location</a> appeared first on <a href="https://bunkerseguridad.es/en">Bunker Seguridad Electrónica S.L.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Well-being is closely linked with health and productivity. Numerous researchs show that employees who are in good mental, physical and emotional health are more likely to deliver optimal performance at work.</p>
<p>The need to establish <strong>secure and reliable environments</strong> is becoming more important, so that employees can be connected to the corporate network from any remote location and have access to all the resources they need. To accomplish it without exposing the company&#8217;s data, we use <strong>Virtual Private Networks (VPNs) and devices that create a virtual &#8220;tunnel&#8221; between communication endpoints</strong>, so the data travels encrypted.</p>
<p><strong>What does a Virtual Private Network provide?</strong></p>
<p>A<strong> VPN brings confidentiality, integrity and security of data transmission</strong>, which is crucial, especially if you have to manage <strong>confidential information or sensitive data</strong>. VPNs are becoming increasingly popular, even in private environments, because they are the most versatile professional solution for secure data sharing.</p>
<p><strong>What are the most important features a VPN should have?</strong></p>
<p>A VPN needs to <strong>block any attempt by unauthorised people to access, read, block or alter the contents</strong> of your internet connections. These tasks are achieved by hiding the entirety of all of the data and connection administration information that passes between your computer and the web servers with which it communicates. This is accomplished by encryption. If an outsider, scraper, bot or other kind of abusive traffic tries to access our connection, all it will be able to do is read the encrypted data, without any possibility of getting to the real information we are sending.</p>
<p>At first place, you need a private and secure connection and to ensure that, you have to use <strong>powerful cryptographic algorithms such as AES, Blowfish, Camelia</strong>, etc. The security of the encryption also depends on the size of the keys and the most used are <strong>128, 192 and 256 bits</strong>.</p>
<p>Even though a VPN can be created using software solutions,<strong> hardware solutions are less vulnerable to possible attacks and transmission problems</strong>. They are also more reliable. We recommend ThruLink<sup>TM</sup> devices from KBC Networks, which stand out for their <strong>rugged design and optimized transmission performance</strong>.</p>
<p><strong>What other advantages does a connection managed by ThruLink<sup>TM</sup> provide?</strong></p>
<ul>
<li>The quality of KBC Networks&#8217; devices is always very high, in the case of ThruLink<sup>TM</sup> that assures good <strong>resistance, reliability and quality of the connection</strong>.</li>
<li>In addition, the connection established with the server is <strong>completely encrypted</strong>. You can choose from a long list of encryptions: <strong>AES:128/192/256bits, Blowfish: 128/196/256bits, Camellia: 128/196/256bits, SHA1, SHA256, RSA: 128/196/256bits, FIPS: 140-2</strong>.</li>
<li>On the other hand, unlike the vast majority of companies that offer this service, ThruLink<sup>TM</sup> <strong>does not require the recurrent recurring license fees</strong>, nor maintenance.</li>
<li>The systems created with ThruLink<sup>TM</sup> are scalable and easy to configure.</li>
<li><strong>Signals can be transmitted over either private and public networks</strong>.</li>
<li>The <strong>multiple failover</strong> capability ensures a stable connection.</li>
</ul>
<p><strong>What do I need to have an encrypted connection with ThruLink<sup>TM</sup>?</strong></p>
<p>You need an Internet connection (via cable, Wireless or a SIM card), one device at the work site, one device at each remote location where you want to make a secure connection and one computer for device configuration purposes only.</p>
<p>It is important to note that the installation of the equipment is very simple and does not require advanced computer or network knowledge.</p>
<p>In situations such as the one we are currently experiencing, where it is imperative to protect the health of employees, without interrupting customer service, we promote and recommend teleworking.</p>
<p>For more detailed and personalised information on this device and its applications, please contact us.</p>
<p><a href="https://www.youtube.com/watch?v=kF3oQVPqtbE" target="_blank" rel="noopener">Watch our YouTube video.</a></p>
<p>The post <a href="https://bunkerseguridad.es/en/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/">Virtual Private Networks (VPN) for secure remote working from any location</a> appeared first on <a href="https://bunkerseguridad.es/en">Bunker Seguridad Electrónica S.L.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://bunkerseguridad.es/en/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ThruLink™: hardware device for virtual private networks of KBC Networks</title>
		<link>https://bunkerseguridad.es/en/thrulink-hardware-device-for-virtual-private-networks-of-kbc-networks/</link>
					<comments>https://bunkerseguridad.es/en/thrulink-hardware-device-for-virtual-private-networks-of-kbc-networks/#respond</comments>
		
		<dc:creator><![CDATA[Prácticas 1]]></dc:creator>
		<pubDate>Thu, 09 May 2019 10:23:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[KBC Networks]]></category>
		<category><![CDATA[ThruLink™]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://bunkerseguridad.es/en/?p=1028</guid>

					<description><![CDATA[<p>This system, designed for traffic management and encryption for VPN, offers stable, secure and private connections over the Internet and at a reduced cost. Piece of news: The new hardware device for virtual networks (VPN) ThruLink™ of KBC Networks allows to create a secure, private and encrypted conduit within a public network that protects the [&#8230;]</p>
<p>The post <a href="https://bunkerseguridad.es/en/thrulink-hardware-device-for-virtual-private-networks-of-kbc-networks/">ThruLink™: hardware device for virtual private networks of KBC Networks</a> appeared first on <a href="https://bunkerseguridad.es/en">Bunker Seguridad Electrónica S.L.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This system, designed for traffic management and encryption for VPN, offers stable, secure and private connections over the Internet and at a reduced cost.</em></p>
<p><strong>Piece of news: </strong><br />
   The new hardware device for virtual networks (VPN) <strong>ThruLink™</strong> of KBC Networks allows to create a secure, private and encrypted conduit within a public network that protects the information making it remain separate from the rest of communications.</p>
<p>   <strong>ThruLink™</strong> is a reliable and economical alternative to leased lines (it uses public networks such as the Internet), which reduces costs. In contrast to other solutions, such as a software-based VPN or a router with VPN functions, this device is easy and quick to install; its configuration is simple (no specific knowledge or specialized technical personnel are necessary), and no additional software licenses are required.</p>
<p>   Designed exclusively for traffic management and for VPN encryption, <strong>ThruLink™</strong> is optimized for CCTV (closed circuit television) systems, and can also be used for access control, public security systems, industrial control, government and military systems, remote video surveillance, secure data transmission, interconnection, monitoring of environmental and traffic alarms.</p>
<p>   The latter is the case of the Singapore Intelligent Transport System: Singapore&#8217;s Junction Electric Eyes intelligent transport system helps maintain traffic flow, reduce congestion and provide motorists with up-to-date traffic information. The high cost of the rented lines made the transport authority of the city look for a more economical alternative finding in <strong>ThruLink™</strong> the solution.</p>
<p>    KBC Networks markets through Bunker Seguridad, the <strong>ThruLink™</strong> device in its two series: <em>ThruLink™ Standard Capacity / Standard Capacity Plus and ThruLink™ High Capacity / High Capacity Plus</em>, with their respective models.</p>
<p>The post <a href="https://bunkerseguridad.es/en/thrulink-hardware-device-for-virtual-private-networks-of-kbc-networks/">ThruLink™: hardware device for virtual private networks of KBC Networks</a> appeared first on <a href="https://bunkerseguridad.es/en">Bunker Seguridad Electrónica S.L.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://bunkerseguridad.es/en/thrulink-hardware-device-for-virtual-private-networks-of-kbc-networks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
