{"id":192008,"date":"2017-05-09T15:34:06","date_gmt":"2017-05-09T19:34:06","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-has-vpn-evolution-changed-remote-access-techtarget\/"},"modified":"2017-05-09T15:34:06","modified_gmt":"2017-05-09T19:34:06","slug":"how-has-vpn-evolution-changed-remote-access-techtarget","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/evolution\/how-has-vpn-evolution-changed-remote-access-techtarget\/","title":{"rendered":"How has VPN evolution changed remote access? &#8211; TechTarget"},"content":{"rendered":"<p><p>    VPNs, or virtual private networks, have been around for a    while. Over the past two decades, VPN evolution has    transitioned...  <\/p>\n<p>          Enjoy this article as well as all of our content,          including E-Guides, news, tips and more.        <\/p>\n<p>            By submitting your personal information, you agree that            TechTarget and its partners may contact you regarding            relevant content, products and special offers.          <\/p>\n<p>            You also agree that your personal information may be            transferred and processed in the United States, and            that you have read and agree to the Terms of Use and the Privacy Policy.          <\/p>\n<p>    the technology from point-to-point connectors that facilitate    remote access to one that's based on sophisticated security    multipoint connectivity.  <\/p>\n<p>    Every technology has a lifecycle, and VPNs are no different.    VPN evolution has taken place over the years, adapting to the    networks that have been shaped by broadband connectivity, the    cloud and mobility, as well as the endpoint devices themselves.  <\/p>\n<p>    Reflecting back on the early days of VPNs and how far we have    come, the evolution can be broken down into four phases. Let's    take a closer look.  <\/p>\n<p>    In the early 1990s, VPNs were used solely for dial-up    connections and to create private networks across public    infrastructure. Data networks allowed VPN remote connectivity    through dial-up modems operated by telecommunication carriers.    As cyberattacks and data breaches were not yet a major issue or    concern for early internet surfers, VPNs were not yet in demand    for their privacy and security features.  <\/p>\n<p>    However, as the internet progressed, so did cybercriminals. In    the mid-1990s, computer viruses, identity theft, malware,    hacking, phishing    and     denial-of-service attacks began to spread globally, and a    more secure and sophisticated internet was now vital.  <\/p>\n<p>    In the 2000s, VPNs became mainstream and were essentially    available to all users for remote dial-in, mobile and multiuse    networks. The emergence of home computers and private email    proved to rapidly increase the vulnerability of internet    connections and networks. To protect sensitive information and    to reduce risks of cyberattacks, internet users began using    VPNs to secure connections, prevent malware, ensure digital    privacy and hide their physical locations.  <\/p>\n<p>    Security features, such as firewalls,     VPN tunneling, encryption, authentication and endpoint    security, were now critical to prevent unauthorized access to    or from a private network.  <\/p>\n<p>    The proliferation of smartphones and connected devices,    starting in 2010, fueled the next wave of VPN technology and    drove more sophisticated security options. Secure connections    were simply not enough. The need to authenticate the user and    the endpoint device required new capabilities. To ensure a new    level of authentication for VPNs, advanced methods such as        one-time password tokens, fingerprint IDs, iris scans and    voice recognition were integrated.  <\/p>\n<p>    As the need for VPNs grew, they needed to be centrally managed.    Today, VPNs offer comprehensive automation that eliminates the    need for endpoint administration or user involvement. By taking    the responsibility of facilitating VPNs away from users,    configuration and management are free from manual errors.    Endpoint devices are also more intelligent, enabling them to    communicate with VPNs and other third-party infrastructure,    such as firewalls, mobile device management, proxies and other    malware, and     antivirus software.  <\/p>\n<p>      VPNs are increasingly used to secure data tunnels between end      devices and internal corporate networks.    <\/p>\n<p>    As the     internet of things and     industrial internet of things mature, the implications for    VPNs will also continue to evolve. Due to the majority of    businesses implementing     BYOD or allowing employees to work from home, VPNs are    increasingly used to secure data tunnels between end devices    and internal corporate networks. The leading VPNs can secure    virtually any device using any connection medium, as well as    maintain secure connections as they traverse from network to    network.  <\/p>\n<p>    With the growth of connected cars,     vehicle VPNs have emerged. A vehicle VPN enables users to    safely and securely access a private network from a car without    compromising any sensitive information. VPNs also help prevent    hacking and other potential security threats, a particularly    important benefit when manufacturers roll out software updates    for engine control and car electronics systems via the internet    and cloud data centers.  <\/p>\n<p>    It is worth noting that the same VPN used to secure a laptop's    network connection is the same VPN that can be used to secure a    car's internet connection.  <\/p>\n<p>    Cybercriminals will continue to find new ways to infiltrate and    attack internet connections and private networks. With over 3    billion internet users worldwide, it is crucial for every end    device to use a VPN for secure and encrypted data exchange.    Currently, only a fraction of internet users use VPNs.    Furthermore, as more households acquire more connected devices,    the risk of cyberattacks will dramatically increase.  <\/p>\n<p>    Today's modern VPNs are versatile, cost-efficient and offer    comprehensive automation. All internet users can benefit from    the security and privacy that a VPN provides through personal    firewalls, advanced authentication and ciphertext.  <\/p>\n<p>    Secure communication is one of the most important foundations    for our future, and it is imperative to protect data in motion    with VPN evolution.  <\/p>\n<p>    The evolving role of     SSL VPNs  <\/p>\n<p>    The     history of VPNs  <\/p>\n<p>    Past, present and future     VPNs  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/searchnetworking.techtarget.com\/answer\/How-has-VPN-evolution-changed-remote-access\" title=\"How has VPN evolution changed remote access? - TechTarget\">How has VPN evolution changed remote access? - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> VPNs, or virtual private networks, have been around for a while. Over the past two decades, VPN evolution has transitioned.. <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/evolution\/how-has-vpn-evolution-changed-remote-access-techtarget\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187748],"tags":[],"class_list":["post-192008","post","type-post","status-publish","format-standard","hentry","category-evolution"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192008"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=192008"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/192008\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=192008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=192008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=192008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}