Side-step the Internet censorship threat
Most people in the Western world regard privacy as one of most fundamental rights in a democratic society. They also take it for granted that these democratic principles apply equally to the Internet.
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Side-step the Internet censorship threat
Most people in the Western world regard privacy as one of most fundamental rights in a democratic society. They also take it for granted that these democratic principles apply equally to the Internet.
VPNs can ease privacy concerns
High profile data breaches at companies like Mossack Fonseca, Target, Home Depot and Wendy’s along with Government controversies like Edward Snowden and the FBI’s legal suit against Apple after the San Bernadino shootings have severely dented public confidence in the ability of ...
More anonymity with Tor and VPN?
Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users are not completely invisible.
Trouble in store? Don’t forget VPN
For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were followed in 2015 by Dungarees, Starbucks, CVS, Toys R Us and Wallmart Canada.
Germany is reported to be increasingly left behind in terms of digitization in public spaces. The reason: There are just not enough hotspots available. A political decision has now been taken to abolish any “disturber“ liability (“Störerhaftung” under German law). This means, the ...
Big data, big security questions
Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big data tools.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.