dcsimg

IDVector Unfurls Secure VPN Service

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Linked in  
Email  
Slide Show

Top 6 Trends that Impact Your Security Posture

As the sophistication of the cyberattacks by both criminals and nation states increases, the need to secure communications is becoming a much higher priority for small and large organizations alike. The trouble is that network links between any given end point and a data center are all too easily compromised.

Looking to solve that problem, IDVector today launched an Internet service based on virtual private network (VPN) technology that not only encrypts all data flow across the connection, it allows an end user to specify how that data will flow across the IDVector service.

While there are any number of tools organizations can deploy to secure communications, IDVector CEO Ben Baumgartner says, most of those tools are too complicated for the average end user to master.

“Software such as Tor is just too difficult for end users to figure out how to regularly use,” says Baumgartner.

IDVector Unfurls Secure VPN Service

Baumgartner notes that many of those applications are primarily used to conduct illicit transactions on the so-called Dark Web. The IDVector service automatically encrypts data flowing across any public network in a way that makes it difficult for intruders to even determine where that traffic is originating from or what its ultimate destination is, says Baumgartner.

Available as a subscription service, Baumgartner says, IDVector is designed to be something an individual end user can deploy on their own or be made available across an entire organization by the internal IT department.

Many IT organizations are provisioning end users who travel to locations where cybersecurity intrusions are commonplace with dedicated devices that are wiped clean of all sensitive data. The ability to employ a service to secure any device will no doubt have a certain amount of appeal. The challenge is going to be getting end users to remember to invoke it every time they connect to the Internet.

Save

Save

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS