{"id":1007,"date":"2021-06-26T09:00:40","date_gmt":"2021-06-26T09:00:40","guid":{"rendered":"https:\/\/bunkerseguridad.es\/en\/?p=1007"},"modified":"2021-06-30T10:26:03","modified_gmt":"2021-06-30T10:26:03","slug":"virtual-private-networks-vpn-for-secure-remote-working-from-any-location","status":"publish","type":"post","link":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/","title":{"rendered":"Virtual Private Networks (VPN) for secure remote working from any location"},"content":{"rendered":"<p>Well-being is closely linked with health and productivity. Numerous researchs show that employees who are in good mental, physical and emotional health are more likely to deliver optimal performance at work.<\/p>\n<p>The need to establish <strong>secure and reliable environments<\/strong> is becoming more important, so that employees can be connected to the corporate network from any remote location and have access to all the resources they need. To accomplish it without exposing the company&#8217;s data, we use <strong>Virtual Private Networks (VPNs) and devices that create a virtual &#8220;tunnel&#8221; between communication endpoints<\/strong>, so the data travels encrypted.<\/p>\n<p><strong>What does a Virtual Private Network provide?<\/strong><\/p>\n<p>A<strong> VPN brings confidentiality, integrity and security of data transmission<\/strong>, which is crucial, especially if you have to manage <strong>confidential information or sensitive data<\/strong>. VPNs are becoming increasingly popular, even in private environments, because they are the most versatile professional solution for secure data sharing.<\/p>\n<p><strong>What are the most important features a VPN should have?<\/strong><\/p>\n<p>A VPN needs to <strong>block any attempt by unauthorised people to access, read, block or alter the contents<\/strong> of your internet connections. These tasks are achieved by hiding the entirety of all of the data and connection administration information that passes between your computer and the web servers with which it communicates. This is accomplished by encryption. If an outsider, scraper, bot or other kind of abusive traffic tries to access our connection, all it will be able to do is read the encrypted data, without any possibility of getting to the real information we are sending.<\/p>\n<p>At first place, you need a private and secure connection and to ensure that, you have to use <strong>powerful cryptographic algorithms such as AES, Blowfish, Camelia<\/strong>, etc. The security of the encryption also depends on the size of the keys and the most used are <strong>128, 192 and 256 bits<\/strong>.<\/p>\n<p>Even though a VPN can be created using software solutions,<strong> hardware solutions are less vulnerable to possible attacks and transmission problems<\/strong>. They are also more reliable. We recommend ThruLink<sup>TM<\/sup> devices from KBC Networks, which stand out for their <strong>rugged design and optimized transmission performance<\/strong>.<\/p>\n<p><strong>What other advantages does a connection managed by ThruLink<sup>TM<\/sup> provide?<\/strong><\/p>\n<ul>\n<li>The quality of KBC Networks&#8217; devices is always very high, in the case of ThruLink<sup>TM<\/sup> that assures good <strong>resistance, reliability and quality of the connection<\/strong>.<\/li>\n<li>In addition, the connection established with the server is <strong>completely encrypted<\/strong>. You can choose from a long list of encryptions: <strong>AES:128\/192\/256bits, Blowfish: 128\/196\/256bits, Camellia: 128\/196\/256bits, SHA1, SHA256, RSA: 128\/196\/256bits, FIPS: 140-2<\/strong>.<\/li>\n<li>On the other hand, unlike the vast majority of companies that offer this service, ThruLink<sup>TM<\/sup> <strong>does not require the recurrent recurring license fees<\/strong>, nor maintenance.<\/li>\n<li>The systems created with ThruLink<sup>TM<\/sup> are scalable and easy to configure.<\/li>\n<li><strong>Signals can be transmitted over either private and public networks<\/strong>.<\/li>\n<li>The <strong>multiple failover<\/strong> capability ensures a stable connection.<\/li>\n<\/ul>\n<p><strong>What do I need to have an encrypted connection with ThruLink<sup>TM<\/sup>?<\/strong><\/p>\n<p>You need an Internet connection (via cable, Wireless or a SIM card), one device at the work site, one device at each remote location where you want to make a secure connection and one computer for device configuration purposes only.<\/p>\n<p>It is important to note that the installation of the equipment is very simple and does not require advanced computer or network knowledge.<\/p>\n<p>In situations such as the one we are currently experiencing, where it is imperative to protect the health of employees, without interrupting customer service, we promote and recommend teleworking.<\/p>\n<p>For more detailed and personalised information on this device and its applications, please contact us.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=kF3oQVPqtbE\" target=\"_blank\" rel=\"noopener\">Watch our YouTube video.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well-being is closely linked with health and productivity. Numerous researchs show that employees who are in good mental, physical and emotional health are more likely to deliver optimal performance at work. The need to establish secure and reliable environments is becoming more important, so that employees can be connected to the corporate network from any [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[216,215],"tags":[247,244,245,243],"class_list":["post-1007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-more","category-news-events","tag-kbc-networks","tag-remote-working","tag-secure-data-transmission","tag-vpn"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Virtual Private Networks (VPN) for secure remote working from any location - Bunker Seguridad Electr\u00f3nica S.L.<\/title>\n<meta name=\"description\" content=\"VPN hardware ThruLink brings confidentiality, integrity and security of data transmission over private and public networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtual Private Networks (VPN) for secure remote working from any location - Bunker Seguridad Electr\u00f3nica S.L.\" \/>\n<meta property=\"og:description\" content=\"VPN hardware ThruLink brings confidentiality, integrity and security of data transmission over private and public networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/\" \/>\n<meta property=\"og:site_name\" content=\"Bunker Seguridad Electr\u00f3nica S.L.\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-26T09:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-30T10:26:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pr\u00e1cticas 1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pr\u00e1cticas 1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/\",\"url\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/\",\"name\":\"Virtual Private Networks (VPN) for secure remote working from any location - Bunker Seguridad Electr\u00f3nica S.L.\",\"isPartOf\":{\"@id\":\"https:\/\/bunkerseguridad.es\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg\",\"datePublished\":\"2021-06-26T09:00:40+00:00\",\"dateModified\":\"2021-06-30T10:26:03+00:00\",\"author\":{\"@id\":\"https:\/\/bunkerseguridad.es\/en\/#\/schema\/person\/23e6a3f7db6925a95362ddfc01b652c0\"},\"description\":\"VPN hardware ThruLink brings confidentiality, integrity and security of data transmission over private and public networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#primaryimage\",\"url\":\"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg\",\"contentUrl\":\"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg\",\"width\":700,\"height\":400,\"caption\":\"VPN ThruLink - KBC Networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bunkerseguridad.es\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Virtual Private Networks (VPN) for secure remote working from any location\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bunkerseguridad.es\/en\/#website\",\"url\":\"https:\/\/bunkerseguridad.es\/en\/\",\"name\":\"Bunker Seguridad Electr\u00f3nica S.L.\",\"description\":\"Manufacturing and distribution of perimeter detection systems in Europe.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bunkerseguridad.es\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bunkerseguridad.es\/en\/#\/schema\/person\/23e6a3f7db6925a95362ddfc01b652c0\",\"name\":\"Pr\u00e1cticas 1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bunkerseguridad.es\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b041e136ce06bbf95a28bbf51b006e532561a4cd11845185eb338d5261ece645?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b041e136ce06bbf95a28bbf51b006e532561a4cd11845185eb338d5261ece645?s=96&d=mm&r=g\",\"caption\":\"Pr\u00e1cticas 1\"},\"url\":\"https:\/\/bunkerseguridad.es\/en\/author\/practicas1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtual Private Networks (VPN) for secure remote working from any location - Bunker Seguridad Electr\u00f3nica S.L.","description":"VPN hardware ThruLink brings confidentiality, integrity and security of data transmission over private and public networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/","og_locale":"en_US","og_type":"article","og_title":"Virtual Private Networks (VPN) for secure remote working from any location - Bunker Seguridad Electr\u00f3nica S.L.","og_description":"VPN hardware ThruLink brings confidentiality, integrity and security of data transmission over private and public networks.","og_url":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/","og_site_name":"Bunker Seguridad Electr\u00f3nica S.L.","article_published_time":"2021-06-26T09:00:40+00:00","article_modified_time":"2021-06-30T10:26:03+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg","type":"image\/jpeg"}],"author":"Pr\u00e1cticas 1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pr\u00e1cticas 1","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/","url":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/","name":"Virtual Private Networks (VPN) for secure remote working from any location - Bunker Seguridad Electr\u00f3nica S.L.","isPartOf":{"@id":"https:\/\/bunkerseguridad.es\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#primaryimage"},"image":{"@id":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#primaryimage"},"thumbnailUrl":"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg","datePublished":"2021-06-26T09:00:40+00:00","dateModified":"2021-06-30T10:26:03+00:00","author":{"@id":"https:\/\/bunkerseguridad.es\/en\/#\/schema\/person\/23e6a3f7db6925a95362ddfc01b652c0"},"description":"VPN hardware ThruLink brings confidentiality, integrity and security of data transmission over private and public networks.","breadcrumb":{"@id":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#primaryimage","url":"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg","contentUrl":"https:\/\/bunkerseguridad.es\/en\/wp-content\/uploads\/2020\/03\/vpn-thrulink.jpg","width":700,"height":400,"caption":"VPN ThruLink - KBC Networks"},{"@type":"BreadcrumbList","@id":"https:\/\/bunkerseguridad.es\/en\/virtual-private-networks-vpn-for-secure-remote-working-from-any-location\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bunkerseguridad.es\/en\/"},{"@type":"ListItem","position":2,"name":"Virtual Private Networks (VPN) for secure remote working from any location"}]},{"@type":"WebSite","@id":"https:\/\/bunkerseguridad.es\/en\/#website","url":"https:\/\/bunkerseguridad.es\/en\/","name":"Bunker Seguridad Electr\u00f3nica S.L.","description":"Manufacturing and distribution of perimeter detection systems in Europe.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bunkerseguridad.es\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bunkerseguridad.es\/en\/#\/schema\/person\/23e6a3f7db6925a95362ddfc01b652c0","name":"Pr\u00e1cticas 1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bunkerseguridad.es\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b041e136ce06bbf95a28bbf51b006e532561a4cd11845185eb338d5261ece645?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b041e136ce06bbf95a28bbf51b006e532561a4cd11845185eb338d5261ece645?s=96&d=mm&r=g","caption":"Pr\u00e1cticas 1"},"url":"https:\/\/bunkerseguridad.es\/en\/author\/practicas1\/"}]}},"_links":{"self":[{"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/posts\/1007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/comments?post=1007"}],"version-history":[{"count":13,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/posts\/1007\/revisions"}],"predecessor-version":[{"id":254970,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/posts\/1007\/revisions\/254970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/media\/2697"}],"wp:attachment":[{"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/media?parent=1007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/categories?post=1007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bunkerseguridad.es\/en\/wp-json\/wp\/v2\/tags?post=1007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}