Try GOLD - Free
The secrets of VPNs for business
PC Pro
|May 2017
Secure access to your network isn’t something to be taken lightly.
If you’re not certain if you need a virtual private network (VPN), or how you’d go about setting one up, that’s okay. Those three little letters represent a minefield around terminology, compatibility, even legality: ask the younger generation what VPNs are for and they’ll think of anonymous, untraceable access to the shadier corners of the internet. Or, they might picture hackers and ransom-demanding pirates taking control of their victims’ machines.
Those bad people are using a VPN, since technically the term can mean any encrypted, encapsulated link from one internet address to another. That says nothing about what it’s used for, what it can or can’t do, who owns it or whether it’s even working. What attracts the bad guys to such technology is the fact that no-one can peer into the data that moves inside those encrypted packets – although the source and destination addresses aren’t encrypted, so it’s always going to be apparent that a link is active.This is why business VPN solutions generally offer extensive security features: the value of the proposition lies in its impenetrability.
Unfortunately, as a result, the marketing spiel can lean towards impressive-sounding gobbledegook, intended to bamboozle senior management types simply looking for “the most secure VPN we can buy”. If you want to make the right choice, you need to start by understanding what’s possible. Then you can choose a way to do it – and stay on top of the accompanying security obligations.
The benefits of a VPN
This story is from the May 2017 edition of PC Pro.
Subscribe to Magzter GOLD to access thousands of curated premium stories, and 10,000+ magazines and newspapers.
Already a subscriber? Sign In
MORE STORIES FROM PC Pro
PC Pro
Carbon-aware computing
Some workloads are energy intensive - but as Steve Cassidy finds out, there are greener and cheaper ways to operate
2 mins
December 2025
PC Pro
Protect your endpoints
Laptops, phones and workstations are often the weakest link in any business's defence strategy, so give them the protection they need.
19 mins
December 2025
PC Pro
Apple AirPods Pro 3
Superb sound quality and amazing noise cancellation make these the standout earphones
3 mins
December 2025
PC Pro
Can humanold robots work?
Nicole Kobie introduces five humanoid robots that want to take our jobs, although only one has succeeded - so far
9 mins
December 2025
PC Pro
Tech firms rival fastfood companies when it comes to marketing disappointment, says Jon Honeyball
There are many things to be disappointed with in modern life.
3 mins
December 2025
PC Pro
"My client had been playing an annoying game with me, but it was actually a good exercise"
Contract length isn't everything: clear drafting and prioritising key issues matter most, as Olivia explains succinctly (but not too succinctly)
7 mins
December 2025
PC Pro
"There's an opportunity here.That is to get the virtualisation bug early in your planning"
As Windows 10's decade-long reign ends, firms must make big decisions on how to introduce Windows 11. Steve offers a novel suggestion
9 mins
December 2025
PC Pro
MICROSOFT DEFENDER VS THE WORLD'S BEST SECURITY SUITES
WITH MICROSOFT'S TOOL NOW OFFERING SOLID PROTECTION YEAR UPON YEAR, WE FIND OUT WHICH OF THE SECURITY SUITES JUSTIFIES ITS PRICE
1 mins
December 2025
PC Pro
Nvidia GeForce RTX 5050
Entry-level Blackwell card brings a much-needed performance boost, but not enough to justify its price
2 mins
December 2025
PC Pro
Confessions of an audio dentist
Extracting troublesome Bluetooth headphones with the help of a soldering iron and a steady hand results in one much happier web call participant
3 mins
December 2025
Translate
Change font size
