{"id":7235,"date":"2021-02-23T19:36:10","date_gmt":"2021-02-23T16:36:10","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=7235"},"modified":"2023-02-09T10:03:25","modified_gmt":"2023-02-09T07:03:25","slug":"vpn-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/vpn-two-factor-authentication\/","title":{"rendered":"Securing VPN with Two-Factor Authentication"},"content":{"rendered":"\n<p>VPN, or virtual private network, is a popular and proven security tool used by companies across the globe to protect remote access to their corporate networks, especially today when almost every company switched to remote work, at least in part. VPN allows the creation of an encrypted link between a user and the company\u2019s private server. And while this secures the corporate infrastructure from the direct attacks of malicious agents, VPNs themselves are still open to hacker intrusion. Here\u2019s where VPN two-factor authentication comes into play.<\/p>\n\n\n\n<p>Multi-factor authentication, or MFA, mitigates multiple VPN security risks, protecting the VPN from unauthorized access in case of user credentials theft. Let\u2019s take a closer look at how MFA allows you to establish the best VPN security, how you can set up VPN two-factor authentication, and which VPN authentication methods to choose.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.protectimus.com\/guides\/openvpn-2fa\/?ref=VPN-2FA-article\" style=\"background-color:#269400\" target=\"_blank\" rel=\"noreferrer noopener\">Add two-factor athentication to your VPN via RADIUS<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-align-left wp-block-heading\"><strong>Why You Should Add 2FA to VPN Connections<\/strong><\/h2>\n\n\n\n<p>Let&#8217;s consider four main reasons you need to secure your VPN connection with two-factor authentication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. VPN Two-Factor Authentication Protects Against Phishing Attacks<\/h3>\n\n\n\n<p>Among the main reasons you should ensure additional VPN security is the trend of <a href=\"https:\/\/www.protectimus.com\/blog\/phishing-vishing-smishing-pharming\/\">phishing attacks<\/a>, which are successfully performed by criminals in up to 17% of cases, according to the Duo report.<\/p>\n\n\n\n<p>Phishing is a&nbsp; <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a> technique when a hacker contacts a person either via email, SMS, or a phone call, pretends to be a reputable organization representative, and persuades their victim to provide their credentials. Often the phishing email or message may contain an attachment with malware or a link that leads to the fake website, anyway, the main goal of the hacker, who performs the phishing attack is to get the user credentials.<\/p>\n\n\n\n<p>If the phishing attack is successful, the hacker may get the login and password required to connect to the corporate system through the VPN. Then, the hacker would be able to enter this user&#8217;s profile, and install the malware, or steal sensitive data from the server computer.<\/p>\n\n\n\n<p>An extra layer of authentication guarantees that the network cannot be breached by outside players, even if they possess the stolen credentials. VPN two-factor authentication verifies the identity of the user not only by a single password but by a <a href=\"https:\/\/www.protectimus.com\/blog\/totp-algorithm-explained\/\">time-based one-time password<\/a>. It is much harder to steal and use such a one-time password as it\u2019s valid only for 30 seconds, thus guarding against phishing and other security threats (<a href=\"https:\/\/www.protectimus.com\/blog\/brute-force-attack\/\">brute force<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/keylogger\/\">keyloggers<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">MITM attacks<\/a>, etc).<\/p>\n\n\n<p><\/p><center><p><\/p>\n<figure class=\"wp-block-embed-twitter aligncenter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">If this shows how your relationship is with your employees then you\u2019re doing it wrong. <a href=\"https:\/\/twitter.com\/hashtag\/phishing?src=hash&amp;ref_src=twsrc%5Etfw\">#phishing<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/employeesstrongestlink?src=hash&amp;ref_src=twsrc%5Etfw\">#employeesstrongestlink<\/a> <a href=\"https:\/\/t.co\/sWswvxaeya\">pic.twitter.com\/sWswvxaeya<\/a><\/p>&mdash; Chief Security Protector of Legal Things (@christiantoon) <a href=\"https:\/\/twitter.com\/christiantoon\/status\/1361074893857652737?ref_src=twsrc%5Etfw\">February 14, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div>\n<\/figure>\n<p><\/p><\/center><p><\/p>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Two-Factor Authentication Is Required to Reach the Compliance Conditions<\/h3>\n\n\n\n<p>While two-factor authentication is helpful for every company that uses VPN for security, some need it more than others.<\/p>\n\n\n\n<p>The security regulations instruct the companies to ensure a certain security level. For instance, the <a href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf\">PCI D<\/a><a href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">S<\/a><a href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf\">S<\/a> (Payment Card Industry Data Security Standard) dictates that organizations should actualize two-factor authentication for network access. Using two-factor authentication is also advised for <a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/ocr\/privacy\/hipaa\/administrative\/securityrule\/remoteuse.pdf?language=es\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a> (Health Insurance Portability and Accountability Act) conformity.<\/p>\n\n\n\n<p>If you\u2019re in the finance or healthcare sector dealing with sensitive data, VPN 2-factor authentication will help you keep your clients\u2019 data private and make sure it does not fall into the wrong hands.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. VPN 2FA Helps to Enforce Certain Specific Security Policies<\/h3>\n\n\n\n<p>Using VPN two-factor authentication solutions leads to a more controlled and detailed approach to safety. With their help, you can create more detailed and specific security policies that will ensure the safety of your corporate data.<\/p>\n\n\n\n<p>For example, you can limit the access to the network to devices located in a certain region or deny access from certain countries (for example, Russia or China famous for a large number of hacker attacks carried out from the territories of these countries). If you want to further limit the chances of malicious play, you can also set up the time of the day your employees can access their corporate accounts. Overall, the best two-factor authentication VPN solutions are the ones that give you the most control.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"544\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/time-filter-in-protectimus.png\" alt=\"time-filters in Protectimus two-factor authentication system for VPN\" class=\"wp-image-7269\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/time-filter-in-protectimus.png 979w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/time-filter-in-protectimus-300x167.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/time-filter-in-protectimus-768x427.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/time-filter-in-protectimus-610x339.png 610w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. VPN 2FA Helps to Ensure Consistent Security for On-Premises and Cloud Apps<\/h3>\n\n\n\n<p>While VPNs are mostly used to secure the connection to the on-sight applications, more organizations are moving towards cloud solutions. This may create a certain discrepancy in the safety of access to different applications.<\/p>\n\n\n\n<p>2-factor authentication helps to remove this discrepancy and make the security check process consistent and reliable on all fronts. Two-factor VPN access will both be familiar to employees that already use cloud solutions, and will provide an additional level of protection for the on-premise software the cloud applications already have.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/remote-work-dream-or-threat\/\">Remote Work: Dream or a Threat?<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-align-left wp-block-heading\"><strong>How does Two-Factor Authentication Secure Your VPN<\/strong><\/h2>\n\n\n\n<p>VPN two-factor authentication adds another layer of security to the primary method of authentication (password). This additional layer should help to validate the user identity, thus ensuring that a person is unable to access the network using compromised credentials.<\/p>\n\n\n\n<p>The extra layer of security should differ from the first one by its nature. Then it is very hard to compromise both authentication factors at the same time. Usually, there are three categories of aspects that are used for authentication, namely:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Knowledge (something the user knows like their password or a mother\u2019s maiden name);<\/li><li>Possession (something the person has like a phone or an authentication token);<\/li><li>Inherence (something the user is like a fingerprint or face ID).<\/li><\/ul>\n\n\n\n<p>If you use a password (something the user knows) as the first authentication factor, then you should use something the person has or is as the second authentication factor.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/multi-factor-authentication-factors.png\" alt=\"VPN two-factor authentication factors - something you know, something you have, and something you are\" class=\"wp-image-7282\" width=\"554\" height=\"497\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/multi-factor-authentication-factors.png 738w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/multi-factor-authentication-factors-300x269.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/multi-factor-authentication-factors-610x547.png 610w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/figure><\/div>\n\n\n<p>The type of two-factor authentication for VPN you choose should depend on which one is easier for you to deploy and make your employees use, and which provides the least chances for the malicious agents to break through. Some of the frequently used two-factor authentication methods are authenticators in smartphone applications or programmable and classic hardware security tokens.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-align-left wp-block-heading\"><strong>Protectimus MFA for VPNs: Features and Benefits<\/strong><\/h2>\n\n\n\n<p>Let\u2019s review what makes Protectimus one of the top two factor VPN authentication solution on the market:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Compatible with Most VPN Solutions<\/h3>\n\n\n\n<p>Protectimus can be connected to any VPN service with the help of the RADIUS networking protocol using the <a href=\"https:\/\/www.protectimus.com\/radius\/\">Protectimus RProxy<\/a> component. This means that it can be used as a VPN 2FA solution with any service that supports RADIUS. This includes such industry leaders as <strong>SonicWall<\/strong> global VPN client and <strong>Sophos VPN<\/strong>. Protectimus can also work as <strong>Cisco VPN<\/strong> 2 factor authentication and <strong>Azure multi-factor authentication VPN<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Easy to Use VPN Two-Factor Authentication<\/h3>\n\n\n\n<p>While Protectimus is a complex and highly customizable service, it is easy to use for both the administrators and the end-user. It can be quickly integrated into the system either through a ready-made solution for the integration via RADIUS or with Protectimus API. If you have any questions and need assistance with integrating Protectimus two-factor authentication into your infrastructure, our technical support team is always ready to connect and help you with the integration in real-time.<\/p>\n\n\n\n<p>When it comes to the server component, you can choose between using the Protectimus cloud service or setting up a private server (<a href=\"https:\/\/www.protectimus.com\/blog\/on-premise-2fa-vs-cloud-based-2fa\/\">either on-premises or on a cloud two-factor authentication<\/a>). While the Protectimus service is ready to use right away off the shelf, with an on-premise platform you have more control. So, you can choose the option that better suits your needs.<\/p>\n\n\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td width=\"50%\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6643\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service.png\" alt=\"Protectimus SaaS Service\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service.png 290w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service-150x150.png 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service-160x160.png 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service-240x240.png 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service-60x60.png 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-cloud-service-184x184.png 184w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6642\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform.png\" alt=\"Protectimus On-Premise Platform\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform.png 290w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform-150x150.png 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform-160x160.png 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform-240x240.png 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform-60x60.png 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Protectimus-on-premise-platform-184x184.png 184w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/td>\n<\/tr>\n<tr>\n<td>\n<p style=\"text-align: center;\"><strong>Cloud Service<br><\/strong><\/p>\n<\/td>\n<td>\n<p style=\"text-align: center;\"><strong>On-premise Platform<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<ul>\n<li>Cost-effective;<\/li>\n<li>Ready-to-use immediately, no need to set up an environment for the MFA server;<\/li>\n<li>Quick integration;<\/li>\n<li>Supports all OATH MFA algorithms and tokens.<\/li>\n<\/ul>\n<\/td>\n<td>\n<ul>\n<li>Customizable;<\/li>\n<li>Can be installed in an isolated network;<\/li>\n<li>You get full control over all operations and sensitive data;<\/li>\n<li>Quick integration;<\/li>\n<li>Supports all OATH MFA algorithms and tokens.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Various OTP Tokens<\/h3>\n\n\n\n<p>Another layer of flexibility Protectimus provides comes with the list of OTP tokens you can choose from. They include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Classic hardware tokens (Protectimus Two);<\/li><li>NFC programmable tokens (Protectimus Slim NFC and Protectimus Flex);<\/li><li>OTP apps on iOS and Android (Protectimus Smart OTP);<\/li><li>One-time code delivery via various channels, including e-mail, SMS, and <a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">2FA chat-bots<\/a> in Facebook, Telegram, and other messengers;<\/li><li>And even third-party hardware tokens support.<\/li><\/ul>\n\n\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td width=\"33%\"><a href=\"https:\/\/www.protectimus.com\/flex\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7178\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/02\/OTP-token-Protectimus-Flex.png\" alt=\"Programmable OTP token Protectimus Flex\" width=\"300\" height=\"152\"><\/a><\/td>\n<td width=\"33%\"><a href=\"https:\/\/www.protectimus.com\/slim-mini\/index.php\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6055\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC.jpg\" alt=\"Programmable TOTP token Protectimus Slim NFC\" width=\"520\" height=\"347\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC.jpg 520w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC-300x200.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC-321x214.jpg 321w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC-140x94.jpg 140w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/a><\/td>\n<td width=\"33%\"><a href=\"https:\/\/www.protectimus.com\/protectimus-two\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6645\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Hardware-TOTP-token-Protectimus-Two.jpg\" alt=\"Hardware OTP token Protectimus Two\" width=\"593\" height=\"310\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Hardware-TOTP-token-Protectimus-Two.jpg 593w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/Hardware-TOTP-token-Protectimus-Two-300x157.jpg 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Additional Security Features<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Data Signing (CWYS &#8211; Confirm What You See)<\/strong> &#8211; OTP passwords generation using data from the user\u2019s current operation. Read more about data signing <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">here<\/a>.<\/li><li><strong>Geographic Filters<\/strong> &#8211; allow you to grant or deny access based on a certain geographic location.<\/li><li><strong>Time-based Filters<\/strong> &#8211; allow you to grant or deny access during a certain period of the day.<\/li><li><strong>IP Filter<\/strong> &#8211; allows you to grant access only from certain approved IP addresses.<\/li><li><strong>User Environment Analysis<\/strong> &#8211; analysis of users\u2019 browser version, operating system, language, screen resolution, etc., and request a one-time password in the case of mismatch with previous data.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">5. Free VPN 2-Factor Authentication Integration Support<\/h3>\n\n\n\n<p>Protectimus team is ready to help with the MFA VPN set up online. No matter how complicated your infrastructure is, we\u2019ll gladly help you to secure your VPN, protect your data, and ensure your safety from potential phishing attacks.<\/p>\n\n\n\n<p>Please, get in touch with our support team with any questions you have at <a href=\"mailto:support@protectimus.com\">support@protectimus.com<\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-left wp-block-heading\"><strong>Read more<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/owa-two-factor-authentication\/\">How to Add Two-Factor Authentication to Outlook Web App (OWA)<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/active-directory-two-factor-authentication\/\">Active Directory Two-Factor Authentication<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/sophos-2fa-with-hardware-tokens\/\">Sophos 2FA with Hardware OTP Tokens<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">Office 365 MFA Hardware Token<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/keycloak-multi-factor-authentication-hardware-tokens\/\">Keycloak Multi-Factor Authentication With Hardware Tokens<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-solutions-comparison-google-authenticator-vs-protectimus\/\">Two-Factor Authentication Solutions Comparison: Google Authenticator vs. Protectimus<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/mfa-myths\/\">6 MFA Myths You Still Believe<\/a><\/li><\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>VPN, or virtual private network, is a popular and proven security tool used by companies across the globe to protect remote access to their corporate networks, especially today when almost every company switched to remote work, at least in part. VPN allows the creation of an encrypted link between a user and the company\u2019s private [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15],"tags":[16,480,1227,12,120,194,1225,1224,1226,976,99,1223],"class_list":["post-7235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","tag-2fa","tag-azure-mfa","tag-cisco","tag-mfa","tag-multifactor-authentication","tag-protectimus-en","tag-protectimus-rproxy","tag-radius","tag-sonicwall","tag-sophos","tag-two-factor-authentication","tag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/7235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=7235"}],"version-history":[{"count":87,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/7235\/revisions"}],"predecessor-version":[{"id":8221,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/7235\/revisions\/8221"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/7254"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=7235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=7235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=7235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}