The spread of the COVID-19 creates the need to establish secure and reliable environments, so that employees can be connected to the corporate network from any remote location and have access to all the resources they need. To accomplish it, we use Virtual Private Networks (VPNs) and devices that create a virtual “tunnel” between communication endpoints, so the data travels encrypted.
What does a Virtual Private Network provide?
A VPN brings confidentiality, integrity and security of data transfer, which is crucial, especially if you have to manage confidential information or sensitive data. VPNs are becoming increasingly popular, even in private environments, because they are the most versatile professional solution for secure data sharing.
What are the most important features a VPN should have?
At first place, you need a private and secure connection and to achieve it, you have to use powerful cryptographic algorithms such as AES, Blowfish, Camelia, etc. The security of the encryption also depends on the size of the keys and the most used are 128, 192 and 256 bits.
Even though a VPN can be created using software solutions, hardware solution are less vulnerable to possible attacks and transmission problems. We recommend ThruLinkTM devices from KBC Networks, which stand out for their rugged design and optimized transmission performance.
What other advantages does a connection managed by ThruLinkTM provide?
- The quality of KBC Networks’ devices is always very high, in the case of ThruLinkTM that assures good resistance, reliability and quality of the connection.
- In addition, the connection established with the server is completely encrypted. You can choose from a long list of encryptions: AES:128/192/256bits, Blowfish: 128/196/256bits, Camellia: 128/196/256bits, SHA1, SHA256, RSA: 128/196/256bits, FIPS: 140-2.
- On the other hand, unlike the vast majority of companies that offer this service, ThruLinkTM does not require the recurrent recurring license fees, nor maintenance.
- The systems created with ThruLinkTM are scalable and easy to configure.
- Signals can be transmitted over either private and public networks.
- The multiple failover capability ensures a stable connection.
What do I need to have an encrypted connection with ThruLinkTM?
You need an Internet connection (via cable, Wireless or a SIM card), a device at the work site, a device at each remote location where you want to make a connection and a computer for device configuration purposes.
It is noteworthy to mention that the installation of the equipment is simple and does not require advanced computer skills.
In situations like the one we are currently in, where it is imperative to protect the employees’ health, without interrupting customer service, we promote and recommend teleworking.
For more detailed and specific information on this device and its applications, please contact us.