Virtual Private Network - VPN

In a private network, members of a specific organization communicate exclusively with each other, whilst in a public network, information is exchanged by numerous participants without distinct relationships to each other. The conception of a VPN, a virtual private network, makes it possible to implement a private network over a public network. As the underlying infrastructure is non-exclusive but shared by numerous connections of different types, a private network is only virtually present.

Virtual connections may be established between two computers, a computer and a network or between two networks. Prerequisites for a VPN are components for encryption and authentication, for packet tunneling, and filtering of network traffic (i.e. firewalling).

In order to connect to the corporate network, clients need to sign up to the VPN server (Praetor) by means of a special software (Miles), or using a hardware client (Imunes). The Securosys VPN Server Praetor establishes connection; takes care for user authentication, implementation of access restrictions on the IP level; assigns a configuration; and sets up and maintains the encrypted tunnel.

VPN

Using the Securosys Miles, Securosys Imunes, and Securosys Praetor the following three types of VPNs can be implemented:

  • Site-to-site VPN: VPN connections are established between two VPN routers with firewall functionality, for instance between headquarters and a branch office. Using this setup, entire networks or segments are safely connected to each other.
  • End-to-site or remote-access VPN: VPN connections are established between remote users and a VPN concentrator to allow remote users secure access to the corporate network.
  • End-to-end VPN: VPN connections are established between two terminals, e.g. between a VPN client and a VPN server.

Your benefits of a Securosys VPN:

  • Authentication and encryption are performed by trusted hardware and software

  • The security depends on cryptographic keys that are automatically generated and managed by dedicated trusted hardware. Neither is a complex certificate management necessary, nor are man-in-the-middle attacks using fake certificates possible.

  • Low-latency VPN: The Securosys VPN connections minimize transmission time, i.e. the delay of the data between the sender and the receiver. As such, time-critical applications are supported.

If you would like to learn more about Securosys Virtual Private Network Solution or like to deploy a trustworthy VPN system, please contact us.


Securosys-not-found-help

Not found what you were looking for?

Customers were also interested in our HSM page or Link/Mesh Encryptor page  -  go to Main Menu