The four factors to consider when selecting a VPN for travel

A VPN can give travelers a much-needed extra layer of cybersecurity and make it easier for them to access censored or geo-blocked content. This article covers the factors you should look at when choosing a VPN for your vacation.While a secure, trustworthy VPN is always a useful tool to protect your online activity, travelers can benefit all the more from a VPN because of the situations they regularly face. Whether connecting to public WiFi or trying to access geo-blocked content from back home, a VPN helps keep your connection secure and unblock websites. With that in mind, there are specific criteria you should look at when choosing a VPN for travel.

Spotlight

Eltima Software

Eltima Software is a global software Development Company, specializing primarily in serial communication, mobile applications and software for all major platforms including Mac OS, Windows, Linux, and Android. We are more focused on development and provision of top notch software solutions and outsourcing that would improve our customers’ business and industrial operations.

OTHER ARTICLES
Virtual Desktop Strategies

How to Start Small and Grow Big with Data Virtualization

Article | July 26, 2022

Why Should Companies Care about Data Virtualization? Data is everywhere. With each passing day, companies generate more data than ever before, and what exactly can they do with all this data? Is it just a matter of storing it? Or should they manage and integrate their data from the various sources? How can they store, manage, integrate and utilize their data to gain information that is of critical value to their business? As they say, knowledge is power, but knowledge without action is useless. This is where the Denodo Platform comes in. The Denodo Platform gives companies the flexibility to evolve their data strategies, migrate to the cloud, or logically unify their data warehouses and data lakes, without affecting business. This powerful platform offers a variety of subscription options that can benefit companies immensely. For example, companies often start out with individual projects using a Denodo Professional subscription, but in a short period of time they end up adding more and more data sources and move on to other Denodo subscriptions such as Denodo Enterprise or Denodo Enterprise Plus. The upgrade process is very easy to establish; in fact, it can be done in less than a day once the cloud marketplace is chosen (Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). In as little as six weeks companies can realize real business benefits from managing and utilizing their data effectively. A Bridging Layer Data virtualization has been around for quite some time now. Denodo’s founders, Angel Viña and Alberto Pan, have been involved in data virtualization from as far back as the 1990’s. If you’re not familiar with data virtualization, here is a quick summary. Data virtualization is the cornerstone to a logical data architecture, whether it be a logical data warehouse, logical data fabric, data mesh, or even a data hub. All of these architectures are best served by our principals Combine (bring together all your data sources), Connect (into a logical single view) and Consume (through standard connectors to your favorite BI/data science tools or through our easy-to-use robust API’s). Data virtualization is the bridge that joins multiple data sources to fuel analytics. It is also the logical data layer that effectively integrates data silos across disparate systems, manages unified data for centralized security, and delivers it to business users in real time. Economic Benefits in Less Than 6 weeks with Data Virtualization? In a short duration, how can companies benefit from choosing data virtualization as a data management solution? To answer this question, below are some very interesting KPI’s discussed in the recently released Forrester study on the Total Economic Impact of Data Virtualization. For example, companies that have implemented data virtualization have seen an 83% increase in business user productivity. Mainly this is due to the business-centric way a data virtualization platform is delivered. When you implement data virtualization, you provide business users with an easy to access democratized interface to their data needs. The second KPI to note is a 67% reduction in development resources. With data virtualization, you connect to the data, you do not copy it. This means once it is set up, there is a significant reduction in the need for data integration engineers, as data remains in the source location and is not copied around the enterprise. Finally, companies are reporting a 65% improvement in data access speeds above and beyond more traditional approaches such as extract, transform, and load (ETL) processes. A Modern Solution for an Age-Old Problem To understand how data virtualization can help elevate projects to an enterprise level, we can share a few use cases in which companies have leveraged data virtualization to solve their business problems across several different industries. For example, in finance and banking we often see use cases in which data virtualization can be used as a unifying platform to help improve compliance and reporting. In retail, we see use cases including predictive analytics in supply chains as well as next and best actions from a unified view of the customer. There are many uses for data virtualization in a wider variety of situations, such as in healthcare and government agencies. Companies use the Denodo Platform to help data scientists understand key trends and activities, both sociologically as well as economically. In a nutshell, if data exists in more than one source, then the Denodo Platform acts as the unifying platform that connects, combines and allows users to consume the data in a timely, cost-effective manner.

Read More
VMware, Vsphere, Hyper-V

Researchers Explore Details of Critical VMware Vulnerability

Article | May 2, 2023

Researchers have published the details of an investigation into CVE-2020-3952, a major vulnerability in VMware's vCenter that was disclosed and patched on April 9. The flaw was given a CVSS score of 10. CVE-2020-3952 exists in VMware's Directory Service (vmdir), which is a part of VMware vCenter Server, a centralized management platform for virtualized hosts and virtual machines. Through vCenter Server, the company says, an administrator can manage hundreds of workloads. The platform uses single sign-on (SSO), which includes vmdir, Security Token Service, an administration server, and the vCenter Lookup Service. Vmdir is also used for certificate management for the workloads vCenter handles.

Read More
Virtual Desktop Tools, Server Hypervisors

Network Virtualization: The Future of Businesses and Networks

Article | June 8, 2023

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More

ProtonVPN iOS app now supports the OpenVPN protocol

Article | May 7, 2020

Your ProtonVPN iOS app is now better equipped to fight censorship and offers more flexible connection options with the launch of OpenVPN for iOS. The OpenVPN protocol is one of the best VPN protocols because of its flexibility, security, and because it is more resistant to blocks. You now have the option to switch between the faster IKEv2 protocol and the more stable and censorship-resistant OpenVPN protocol.

Read More

Spotlight

Eltima Software

Eltima Software is a global software Development Company, specializing primarily in serial communication, mobile applications and software for all major platforms including Mac OS, Windows, Linux, and Android. We are more focused on development and provision of top notch software solutions and outsourcing that would improve our customers’ business and industrial operations.

Related News

VPN

Internet Engineering Task Force standardises quantum-safe VPN protocol created by Post-Quantum

Businesswire | July 18, 2023

The world’s efforts to secure digital communications from the threat posed by quantum computers took a significant leap forward today as a new standard for quantum-safe Virtual Private Networks (VPN) was ratified by the Internet Engineering Task Force (IETF). The new protocol has already been used by Banque de France and Deutsche Bundesbank to secure payments messages, paving the way for full adoption by the Bank for International Settlements to secure communications between the world’s central banks. ‘Harvest Now Decrypt Later’ (HNDL) attacks currently represent the greatest quantum cybersecurity threat. These attacks see hostile actors steal encrypted data now which can be decrypted once a sufficiently mature quantum computer comes online. The new US Quantum Computing Cybersecurity Preparedness Act states that the HNDL risk presents the highest threat to humankind and stipulates that quantum migration must start now. Deploying a VPN based on new post quantum cryptography is the easiest way to protect data-in-transit from such attacks. The new IETF standard specifies how VPNs can exchange communications securely in the quantum age. The novel approach prioritises interoperability by making it possible for multiple post-quantum and classical encryption algorithms to be incorporated into VPNs. Combining both old and new encryption is essential to ensure no disruption to the functioning of existing IT systems, and to protect data from attack by both classical and quantum computers. This is a particularly important milestone for internet connectivity and security as we are transitioning from an era where the world relied upon just one or two algorithms (RSA and Elliptic Curve), to a situation where different nation states are deploying a wide variety of different post-quantum algorithms. This new IETF standard is the glue that allows parties using different public key encryption algorithms to talk with one another. The new IETF standard was proposed and designed by Post-Quantum, a British cyber security company that’s built a portfolio of market-ready quantum-safe cyber security products. Post-Quantum’s own Hybrid PQ VPN uses the new IETF standard and is already in use by NATO to secure its communications from quantum attack, supporting interoperable communications between NATO members. CJ Tjhai, CTO, Post-Quantum and original author of the new IETF standard said: “I’d like to thank all the technologists that collaborated with us on this IETF standard. Much of the focus has been on NIST’s new post quantum encryption algorithms themselves, but this is insufficient unless you have a protocol that defines how the connectivity is done. The easiest way to prevent Harvest Now Decrypt Later attacks is to deploy a PQ VPN based on the new IETF standard. NIST’s new algorithms are only useful if we have agreed standards for their use and mature products that can accommodate them.” Andersen Cheng, Executive Chairman, Post-Quantum added: “CJ and his collaborators have completed important work that makes it possible for tech companies to build quantum-safe VPNs that communicate to one another. We are entering a period where different countries are now recommending different encryption algorithms, so engineering our communications infrastructure to be interoperable and backward compatible is absolutely crucial. That’s the value our own VPN is bringing to organisations like NATO, a diverse member organisation with a variety of post-quantum algorithms in use. “In the commercial sector, we are pleased that Banque de France and Deutsche Bundesbank have also recently completed their project in transmitting payment messages using our protocol, which will pave the way for the Bank for International Settlements to build a complete chain of trust for central bank applications to counter any HNDL risks they already face today.” José María Lucía Moreno, Lead Partner, EY Wavespace and a Post-Quantum partner added: “Our agreement with Post-Quantum is an important step in helping EY and its clients to become quantum-safe. We’re increasingly consulting with our clients to identify where they use traditional encryption that will need to be upgraded, and to help them prepare for the quantum era. Post-Quantum’s approach is particularly interesting because they have modular software-based products like the VPN, which can be implemented together, or as standalones within existing environments, to offer protection today.” The IETF is the non-profit organisation with responsibility for developing the standards that define how the internet is built and used. Now that the IETF has ratified this work, VPN providers will adapt their protocols to match it, making this a defining standard for the future of cybersecurity as the world transitions from classical to new post-quantum encryption. Ratification represents the culmination of work dating back to 2017 when Post-Quantum took the lead in creating the original proposal for this standard. About Post-Quantum Post-Quantum is upgrading the world to next-generation encryption. Our quantum-safe platform includes modular software for Identity, Transmission and Encryption that protect organisations across their entire digital footprint. Products are interoperable, backward compatible and crypto-agile - ensuring a smooth transition to the next generation of encryption. Post-Quantum works with organisations in defence, critical national infrastructure and financial services, including a multi-year relationship with NATO to ensure its communications are secure against quantum attack.

Read More

Virtual Desktop Tools, Virtualized Environments, VPN

CYTRACOM Announces Industry-Leading Network Security for MSPs with ControlOne's New Passwordless Experience and Silent Deployment

PR Newswire | June 02, 2023

Channel leader CYTRACOM announces a significant update to its ControlOne platform, enabling MSPs to prevent managed clients from evading security requirements and create a passwordless experience for end-users. Managed users are now always on the virtual corporate network, secured by unified global security policies, with an experience that is transparent to end users. "With the new capabilities of the ControlOne agent, we are demonstrating our continued commitment to driving innovation within the network security market for managed services providers," says CYTRACOM Co-founder and CEO Zane Conkle. "Working closely with MSPs, we are removing the complexity of connecting and securing users without compromising performance and security. The ControlOne platform enables MSPs to meet the challenges of today's distributed workforce and alleviate the increasing pressure from regulatory and compliance entities, all while driving increased profit for our partners." Game-changing features With the latest release of ControlOne, CYTRACOM is removing the end user from the process of joining or connecting to corporate network infrastructures. "To achieve this objective, we are uniquely leveraging identity management, initially with Microsoft Azure AD and other third-party identity providers coming soon. With this update, the ControlOne agent can now be silently deployed by MSPs through RMM platforms. Unlike VPN software and other security solutions, no interaction with the end user is necessary during setup," says Eric Romano, Head of ControlOne Development, CYTRACOM. Once deployed, end users are always on the corporate network regardless of location and are protected by firewall and security policies directly managed by the MSP. This also enables MSPs to prevent users from disconnecting from the network, essentially closing a major security gap that exists in most solutions available in the market today. CYTRACOM's new ControlOne agent also enables a passwordless experience for users. "No longer do they have to complete set-up procedures or connect and disconnect from the network," continues Romano "ControlOne is always on and enables users to work without having to learn specific processes based on their location like they were forced to do with legacy VPN solutions." Brandt Ball, Founder of Standard I.T. Security adds, "CYTRACOM's ControlOne agent changes the game for us as it enforces always-on security and dramatically cuts deployment costs and effort. We are no longer reliant on the customer to do the right thing or comply with directions which saves us time and money and dramatically improves the experience for the customer. The ControlOne agent integration with Azure AD takes decision-making out of the hands of the customer and ensures they are always connected, always secure, and able to just work. It truly is a win-win." Cyber insurance ready The combination of the new silent deployment and passwordless experience of the CYTRACOM ControlOne agent, along with its ability to eliminate VPNs and firewalls, ensures MSPs innovate and achieve compliance with industry regulations and mandates set forth by cyber insurance providers and other regulatory bodies. "In today's hybrid work environments, we know everyone isn't working inside an office building, but with CYTRACOM's ControlOne platform, MSPs can securely connect and protect users as if they were inside the perimeter of their corporate network at all times," says CYTRACOM COO John Tippett. "ControlOne enables MSPs to regain control over their customers' networks. By eliminating the end user from the equation, MSPs can achieve secure networks and enforce compliance, eliminating vulnerabilities introduced by legacy VPN and on-premises firewalls." About CYTRACOM CYTRACOM delivers infrastructure software purpose-built to empower managed service providers (MSPs) with cloud solutions that connect and secure both traditional and hybrid workforces. Our secure access service edge (SASE) solution provides identity-based network security and connectivity within a single platform that enables businesses to deploy zero-trust networks, enforce compliance and eliminate traditional firewalls and VPNs. Our unified communications suite (UCaaS) uniquely aligns with the operating needs of MSPs and enables their customers to experience seamless communication and collaboration regardless of physical location. Together, these solutions deliver a communications, security and networking platform that is exclusively available to CYTRACOM channel partners.

Read More

VPN

ReasonLabs Unveils RAV VPN Wi-Fi Security to Enhance Online Privacy for Home Users

PR Newswire | May 25, 2023

ReasonLabs, the cybersecurity pioneer equipping families and individuals with the same level of cyber protection used by major global companies, today announced the launch of RAV VPN, its virtual private network that uses the most advanced security practices in the industry to protect user's privacy and keep them secure while connected online. Without proper protection, any Wi-Fi network can be vulnerable to malware and different types of advanced security threats. Cybercriminals often take advantage of vulnerable Wi-Fi networks, such as unsecured public networks, to steal discreet information like financial data, login passwords, and other data. RAV VPN provides defense against unsafe networks while encrypting all transferred data with the latest security protocols - Wireguard, IKVe2, and OpenVPN. It's simple to install and extremely easy-to-use, allowing users to connect quickly, encrypt their internet traffic, and enjoy a trouble-free VPN experience. "We are thrilled about the launch of RAV VPN and what it means for home users worldwide," said Kobi Kalif, CEO at ReasonLabs. "RAV VPN provides a higher level of privacy and security for users to surf the web, stream safely, and connect to public or unsafe networks without worry. By equipping families and individuals with a VPN that is designed for enterprise use, we are delivering on our promise of democratizing enterprise-grade technology for everyone around the world." The release of RAV VPN further expands ReasonLabs' cybersecurity suite aimed at families, individuals, and remote workers. It perfectly complements RAV Endpoint Protection, ReasonLabs' flagship Next-Gen Antivirus solution, as well as RAV EDR, its Endpoint Protection & Response (EDR) software, to provide multilayered protection to users. Led by AI, cybersecurity, and machine-learning experts, ReasonLabs is able to provide the highest levels of cyber defense and digital privacy protection possible. RAV VPN is available for download today with various subscription possibilities and a 30-day money-back assurance. About ReasonLabs ReasonLabs is a cybersecurity pioneer equipping tens of millions of families and individuals worldwide with the same level of cyber protection utilized by Fortune 500 companies. Its AI-powered, next-generation antivirus engine scans billions of files around the world to predict and prevent cyberattacks in real-time, 24/7. Its flagship product, RAV Endpoint Protection, together with its other products combine to form a multilayered solution that safeguards home users against next-generation threats. Co-Founded in 2016 by seasoned cybersecurity expert Andrew Newman—an architect of Microsoft's native cybersecurity program, Microsoft Defender—ReasonLabs is based in New York and Tel Aviv.

Read More

VPN

Internet Engineering Task Force standardises quantum-safe VPN protocol created by Post-Quantum

Businesswire | July 18, 2023

The world’s efforts to secure digital communications from the threat posed by quantum computers took a significant leap forward today as a new standard for quantum-safe Virtual Private Networks (VPN) was ratified by the Internet Engineering Task Force (IETF). The new protocol has already been used by Banque de France and Deutsche Bundesbank to secure payments messages, paving the way for full adoption by the Bank for International Settlements to secure communications between the world’s central banks. ‘Harvest Now Decrypt Later’ (HNDL) attacks currently represent the greatest quantum cybersecurity threat. These attacks see hostile actors steal encrypted data now which can be decrypted once a sufficiently mature quantum computer comes online. The new US Quantum Computing Cybersecurity Preparedness Act states that the HNDL risk presents the highest threat to humankind and stipulates that quantum migration must start now. Deploying a VPN based on new post quantum cryptography is the easiest way to protect data-in-transit from such attacks. The new IETF standard specifies how VPNs can exchange communications securely in the quantum age. The novel approach prioritises interoperability by making it possible for multiple post-quantum and classical encryption algorithms to be incorporated into VPNs. Combining both old and new encryption is essential to ensure no disruption to the functioning of existing IT systems, and to protect data from attack by both classical and quantum computers. This is a particularly important milestone for internet connectivity and security as we are transitioning from an era where the world relied upon just one or two algorithms (RSA and Elliptic Curve), to a situation where different nation states are deploying a wide variety of different post-quantum algorithms. This new IETF standard is the glue that allows parties using different public key encryption algorithms to talk with one another. The new IETF standard was proposed and designed by Post-Quantum, a British cyber security company that’s built a portfolio of market-ready quantum-safe cyber security products. Post-Quantum’s own Hybrid PQ VPN uses the new IETF standard and is already in use by NATO to secure its communications from quantum attack, supporting interoperable communications between NATO members. CJ Tjhai, CTO, Post-Quantum and original author of the new IETF standard said: “I’d like to thank all the technologists that collaborated with us on this IETF standard. Much of the focus has been on NIST’s new post quantum encryption algorithms themselves, but this is insufficient unless you have a protocol that defines how the connectivity is done. The easiest way to prevent Harvest Now Decrypt Later attacks is to deploy a PQ VPN based on the new IETF standard. NIST’s new algorithms are only useful if we have agreed standards for their use and mature products that can accommodate them.” Andersen Cheng, Executive Chairman, Post-Quantum added: “CJ and his collaborators have completed important work that makes it possible for tech companies to build quantum-safe VPNs that communicate to one another. We are entering a period where different countries are now recommending different encryption algorithms, so engineering our communications infrastructure to be interoperable and backward compatible is absolutely crucial. That’s the value our own VPN is bringing to organisations like NATO, a diverse member organisation with a variety of post-quantum algorithms in use. “In the commercial sector, we are pleased that Banque de France and Deutsche Bundesbank have also recently completed their project in transmitting payment messages using our protocol, which will pave the way for the Bank for International Settlements to build a complete chain of trust for central bank applications to counter any HNDL risks they already face today.” José María Lucía Moreno, Lead Partner, EY Wavespace and a Post-Quantum partner added: “Our agreement with Post-Quantum is an important step in helping EY and its clients to become quantum-safe. We’re increasingly consulting with our clients to identify where they use traditional encryption that will need to be upgraded, and to help them prepare for the quantum era. Post-Quantum’s approach is particularly interesting because they have modular software-based products like the VPN, which can be implemented together, or as standalones within existing environments, to offer protection today.” The IETF is the non-profit organisation with responsibility for developing the standards that define how the internet is built and used. Now that the IETF has ratified this work, VPN providers will adapt their protocols to match it, making this a defining standard for the future of cybersecurity as the world transitions from classical to new post-quantum encryption. Ratification represents the culmination of work dating back to 2017 when Post-Quantum took the lead in creating the original proposal for this standard. About Post-Quantum Post-Quantum is upgrading the world to next-generation encryption. Our quantum-safe platform includes modular software for Identity, Transmission and Encryption that protect organisations across their entire digital footprint. Products are interoperable, backward compatible and crypto-agile - ensuring a smooth transition to the next generation of encryption. Post-Quantum works with organisations in defence, critical national infrastructure and financial services, including a multi-year relationship with NATO to ensure its communications are secure against quantum attack.

Read More

Virtual Desktop Tools, Virtualized Environments, VPN

CYTRACOM Announces Industry-Leading Network Security for MSPs with ControlOne's New Passwordless Experience and Silent Deployment

PR Newswire | June 02, 2023

Channel leader CYTRACOM announces a significant update to its ControlOne platform, enabling MSPs to prevent managed clients from evading security requirements and create a passwordless experience for end-users. Managed users are now always on the virtual corporate network, secured by unified global security policies, with an experience that is transparent to end users. "With the new capabilities of the ControlOne agent, we are demonstrating our continued commitment to driving innovation within the network security market for managed services providers," says CYTRACOM Co-founder and CEO Zane Conkle. "Working closely with MSPs, we are removing the complexity of connecting and securing users without compromising performance and security. The ControlOne platform enables MSPs to meet the challenges of today's distributed workforce and alleviate the increasing pressure from regulatory and compliance entities, all while driving increased profit for our partners." Game-changing features With the latest release of ControlOne, CYTRACOM is removing the end user from the process of joining or connecting to corporate network infrastructures. "To achieve this objective, we are uniquely leveraging identity management, initially with Microsoft Azure AD and other third-party identity providers coming soon. With this update, the ControlOne agent can now be silently deployed by MSPs through RMM platforms. Unlike VPN software and other security solutions, no interaction with the end user is necessary during setup," says Eric Romano, Head of ControlOne Development, CYTRACOM. Once deployed, end users are always on the corporate network regardless of location and are protected by firewall and security policies directly managed by the MSP. This also enables MSPs to prevent users from disconnecting from the network, essentially closing a major security gap that exists in most solutions available in the market today. CYTRACOM's new ControlOne agent also enables a passwordless experience for users. "No longer do they have to complete set-up procedures or connect and disconnect from the network," continues Romano "ControlOne is always on and enables users to work without having to learn specific processes based on their location like they were forced to do with legacy VPN solutions." Brandt Ball, Founder of Standard I.T. Security adds, "CYTRACOM's ControlOne agent changes the game for us as it enforces always-on security and dramatically cuts deployment costs and effort. We are no longer reliant on the customer to do the right thing or comply with directions which saves us time and money and dramatically improves the experience for the customer. The ControlOne agent integration with Azure AD takes decision-making out of the hands of the customer and ensures they are always connected, always secure, and able to just work. It truly is a win-win." Cyber insurance ready The combination of the new silent deployment and passwordless experience of the CYTRACOM ControlOne agent, along with its ability to eliminate VPNs and firewalls, ensures MSPs innovate and achieve compliance with industry regulations and mandates set forth by cyber insurance providers and other regulatory bodies. "In today's hybrid work environments, we know everyone isn't working inside an office building, but with CYTRACOM's ControlOne platform, MSPs can securely connect and protect users as if they were inside the perimeter of their corporate network at all times," says CYTRACOM COO John Tippett. "ControlOne enables MSPs to regain control over their customers' networks. By eliminating the end user from the equation, MSPs can achieve secure networks and enforce compliance, eliminating vulnerabilities introduced by legacy VPN and on-premises firewalls." About CYTRACOM CYTRACOM delivers infrastructure software purpose-built to empower managed service providers (MSPs) with cloud solutions that connect and secure both traditional and hybrid workforces. Our secure access service edge (SASE) solution provides identity-based network security and connectivity within a single platform that enables businesses to deploy zero-trust networks, enforce compliance and eliminate traditional firewalls and VPNs. Our unified communications suite (UCaaS) uniquely aligns with the operating needs of MSPs and enables their customers to experience seamless communication and collaboration regardless of physical location. Together, these solutions deliver a communications, security and networking platform that is exclusively available to CYTRACOM channel partners.

Read More

VPN

ReasonLabs Unveils RAV VPN Wi-Fi Security to Enhance Online Privacy for Home Users

PR Newswire | May 25, 2023

ReasonLabs, the cybersecurity pioneer equipping families and individuals with the same level of cyber protection used by major global companies, today announced the launch of RAV VPN, its virtual private network that uses the most advanced security practices in the industry to protect user's privacy and keep them secure while connected online. Without proper protection, any Wi-Fi network can be vulnerable to malware and different types of advanced security threats. Cybercriminals often take advantage of vulnerable Wi-Fi networks, such as unsecured public networks, to steal discreet information like financial data, login passwords, and other data. RAV VPN provides defense against unsafe networks while encrypting all transferred data with the latest security protocols - Wireguard, IKVe2, and OpenVPN. It's simple to install and extremely easy-to-use, allowing users to connect quickly, encrypt their internet traffic, and enjoy a trouble-free VPN experience. "We are thrilled about the launch of RAV VPN and what it means for home users worldwide," said Kobi Kalif, CEO at ReasonLabs. "RAV VPN provides a higher level of privacy and security for users to surf the web, stream safely, and connect to public or unsafe networks without worry. By equipping families and individuals with a VPN that is designed for enterprise use, we are delivering on our promise of democratizing enterprise-grade technology for everyone around the world." The release of RAV VPN further expands ReasonLabs' cybersecurity suite aimed at families, individuals, and remote workers. It perfectly complements RAV Endpoint Protection, ReasonLabs' flagship Next-Gen Antivirus solution, as well as RAV EDR, its Endpoint Protection & Response (EDR) software, to provide multilayered protection to users. Led by AI, cybersecurity, and machine-learning experts, ReasonLabs is able to provide the highest levels of cyber defense and digital privacy protection possible. RAV VPN is available for download today with various subscription possibilities and a 30-day money-back assurance. About ReasonLabs ReasonLabs is a cybersecurity pioneer equipping tens of millions of families and individuals worldwide with the same level of cyber protection utilized by Fortune 500 companies. Its AI-powered, next-generation antivirus engine scans billions of files around the world to predict and prevent cyberattacks in real-time, 24/7. Its flagship product, RAV Endpoint Protection, together with its other products combine to form a multilayered solution that safeguards home users against next-generation threats. Co-Founded in 2016 by seasoned cybersecurity expert Andrew Newman—an architect of Microsoft's native cybersecurity program, Microsoft Defender—ReasonLabs is based in New York and Tel Aviv.

Read More

Events