{"id":693,"date":"2020-01-28T02:26:00","date_gmt":"2020-01-28T02:26:00","guid":{"rendered":"https:\/\/leciir.com\/?post_type=blog_post&#038;p=693"},"modified":"2020-01-28T13:16:28","modified_gmt":"2020-01-28T13:16:28","slug":"a-secure-vpn-service-threat-protection-into-the-unknown","status":"publish","type":"blog_post","link":"https:\/\/leciir.com\/?blog_post=a-secure-vpn-service-threat-protection-into-the-unknown","title":{"rendered":"A Secure VPN Service: Threat protection into the unknown"},"content":{"rendered":"\n<p><em>We often hear about how VPNs can protect our information, location, and identity from the internet &#8211; but then what? Beyond that secured tunnel are threats to which users and enterprises remain vulnerable without adequate protection. Filtering traffic at this level protects enterprises from these threats, ensuring a fully secure VPN service. <\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>What is a VPN?<\/strong><\/p>\n\n\n\n<p>As the Federal Trade Commission describes, the use of a VPN (Virtual Private Network) routes user data to\/from the internet through servers at another location. This makes data from the user appear as though it&#8217;s coming from a server operated by a VPN provider. For VPNs that encrypt data, this also means protecting data from being read by anyone monitoring the network connection. The following diagram demonstrates a basic VPN pathway.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/VPN1.png\" alt=\"o \nUser\/Site \n-o \nUser\/site \nO \nUser\/Site \nInternet \" class=\"wp-image-695\" width=\"525\" height=\"206\" srcset=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/VPN1.png 525w, https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/VPN1-480x189.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 525px, 100vw\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Simply put, the use of a VPN to access the internet provides a secure, encrypted tunnel (shown in green above) for data to and from a user. But, what happens after data leaves that secure tunnel? <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>A shift in focus<\/strong><\/p>\n\n\n\n<p>The security of a\nVPN is focused between the user and the VPN server. Beyond this server, to the\ninternet, the connection loses this security and data remains vulnerable. Any\nthreats picked up on the internet can then potentially be brought back to the user\nthrough an open VPN tunnel.<\/p>\n\n\n\n<p>With sufficient security (firewall, antivirus\u2026), the user is protected. But, what if that protection were applied at the VPN level? Shown below, by shifting security focus one step back, to the server, threats can be blocked before they are ever able to infiltrate a corporate network, for example. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/VPN2-1024x367.png\" alt=\"o \nUser\/Site \n\u2014O \nVPN \nUser\/site \nO \nUser\/Site \nInternet \" class=\"wp-image-697\" width=\"569\" height=\"203\"\/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Monitoring traffic from the internet into and out of a secure VPN tunnel allows security processes to block threats at the earliest point of entry. As a result, the security of  VPNs shifts from identity and location masking to threat protection and mitigation. At this level, it&#8217;s about which adaptive security appliance offers the best protection for your security needs.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>VPN and enterprise security services<\/strong><\/p>\n\n\n\n<p>When it comes to\nthreat protection, firewall and email security are key. The right firewall\nappliance efficiently filters data on route to and from the internet, while an\nemail and spam security appliance keeps communications clean. <\/p>\n\n\n\n<p>Placing these\nappliances (or filters) at the VPN level offers advantages user to user, as\nwell as for larger enterprises. Users and smaller businesses, for instance, may\nopt for a full VPN security package, allowing for more simplicity and less\ninvestment in on-site protection services and infrastructure. Enterprises, on\nthe other hand, can use the approach to manage the security of several sites\nearly-on in the network infrastructure.&nbsp; <\/p>\n\n\n\n<p>At LeCiiR, we want you to Live Easy and securely. That&#8217;s why we offer a truly fully secured VPN service. Our approach provides entry-point threat mitigation and traffic control, as well as the ability to adapt and grow with any network changes. For questions on this topic or any others, don&#8217;t hesitate to <a href=\"https:\/\/leciir.com\/?page_id=84\" class=\"rank-math-link\">contact us<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/Artboard-1@3x-1.png\" alt=\"\" class=\"wp-image-696\" width=\"179\" height=\"179\" srcset=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/Artboard-1@3x-1.png 378w, https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/Artboard-1@3x-1-300x300.png 300w, https:\/\/leciir.com\/wp-content\/uploads\/2020\/01\/Artboard-1@3x-1-150x150.png 150w\" sizes=\"(max-width: 179px) 100vw, 179px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p>Federal Trade\nCommission, <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/virtual-private-network-vpn-apps\" target=\"_blank\" rel=\"noopener\">Virtual\nPrivate Network (VPN) apps<\/a>. March 2018. <\/p>\n\n\n\n<p>Images: Pixabay<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We often hear about how VPNs can protect our information, location, and identity from the internet &#8211; but then what? Beyond that secured tunnel are threats to which users and enterprises remain vulnerable without adequate protection. Filtering traffic at this level protects enterprises from these threats, ensuring a fully secure VPN service. What is a [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":694,"comment_status":"open","ping_status":"closed","template":"","tags":[20,21,23],"blog-category":[],"_links":{"self":[{"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/blog_post\/693"}],"collection":[{"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/blog_post"}],"about":[{"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/types\/blog_post"}],"author":[{"embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/media\/694"}],"wp:attachment":[{"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=693"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=693"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Fblog-category&post=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}