SHARE
Facebook X Pinterest WhatsApp

IDVector Unfurls Secure VPN Service

Top 6 Trends that Impact Your Security Posture As the sophistication of the cyberattacks by both criminals and nation states increases, the need to secure communications is becoming a much higher priority for small and large organizations alike. The trouble is that network links between any given end point and a data center are all […]

Written By
MV
Mike Vizard
Aug 24, 2016
Slide Show

Top 6 Trends that Impact Your Security Posture

As the sophistication of the cyberattacks by both criminals and nation states increases, the need to secure communications is becoming a much higher priority for small and large organizations alike. The trouble is that network links between any given end point and a data center are all too easily compromised.

Looking to solve that problem, IDVector today launched an Internet service based on virtual private network (VPN) technology that not only encrypts all data flow across the connection, it allows an end user to specify how that data will flow across the IDVector service.

While there are any number of tools organizations can deploy to secure communications, IDVector CEO Ben Baumgartner says, most of those tools are too complicated for the average end user to master.

“Software such as Tor is just too difficult for end users to figure out how to regularly use,” says Baumgartner.

IDVector Unfurls Secure VPN Service

Baumgartner notes that many of those applications are primarily used to conduct illicit transactions on the so-called Dark Web. The IDVector service automatically encrypts data flowing across any public network in a way that makes it difficult for intruders to even determine where that traffic is originating from or what its ultimate destination is, says Baumgartner.

Available as a subscription service, Baumgartner says, IDVector is designed to be something an individual end user can deploy on their own or be made available across an entire organization by the internal IT department.

Many IT organizations are provisioning end users who travel to locations where cybersecurity intrusions are commonplace with dedicated devices that are wiped clean of all sensitive data. The ability to employ a service to secure any device will no doubt have a certain amount of appeal. The challenge is going to be getting end users to remember to invoke it every time they connect to the Internet.

Save

Save

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.