How to Enable a Secure Cloud VPN
Cloud computing has been around for about a decade – ever since the former CEO of Google, Eric Schmidt, introduced the term to the industry.
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
How to Enable a Secure Cloud VPN
Cloud computing has been around for about a decade – ever since the former CEO of Google, Eric Schmidt, introduced the term to the industry.
The EU General Data Protection Regulation
Data protection is considered important, the Federal Data Protection Act is well established and German companies really should be absolute experts in data protection by now.
The Secret to Effective Remote Access VPN Management
According to Ponemon Institute, the growing number of employees using multiple personal and company-owned mobile devices to connect to corporate networks is the biggest endpoint security threat today.
A VPN needs both a client and remote gateway. While NCP offers a complete solution with Secure Enterprise Client and Secure Enterprise VPN Server, some manufacturers only develop their own gateways. Client software is then purchased from another company such as NCP.
NCP Secure Enterprise iOS Client Wins Government Security Award
The Government Security Awards (“The Govies”), organized by Security Today magazine, once again bestowed its top Network Security honors upon NCP.
The ten most serious cyber crimes and data breaches to date
People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular cases often attract our attention such as an attack on a high profile target
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.