Overview
Direct Answer
A Virtual Private Network is a technology that establishes an encrypted tunnel through untrusted networks, enabling remote users and branch offices to access corporate resources securely as though connected directly to the organisation's internal network.
How It Works
A VPN client on the user's device initiates a connection to a VPN gateway, typically authenticating through credentials or certificates. The gateway encrypts all traffic between the client and network, masking the user's actual IP address and location whilst routing data through the provider's infrastructure.
Why It Matters
Organisations depend on VPNs to protect sensitive data transmission, comply with data residency regulations, and enable secure remote work without requiring expensive dedicated leased lines. Cost reduction and flexibility drive widespread adoption across distributed workforces.
Common Applications
Remote employees accessing corporate email and file servers, branch office connectivity, secure access to cloud applications, and protection of data traffic on public Wi-Fi networks represent typical use cases across finance, healthcare, and government sectors.
Key Considerations
VPN performance may degrade throughput due to encryption overhead, and centralised VPN gateways create bottlenecks under high user loads. Trust assumptions remain critical—the VPN provider itself gains visibility into user behaviour and must be carefully selected.
More in Networking & Communications
Computer Network
Protocols & StandardsA collection of interconnected computing devices that share resources and communicate using standardised protocols.
Wi-Fi 6
Protocols & StandardsThe sixth generation of Wi-Fi technology offering improved speed, capacity, and performance in dense environments.
Network Automation
Protocols & StandardsUsing software to automatically configure, manage, test, deploy, and operate network devices and services.
Bandwidth
Protocols & StandardsThe maximum rate of data transfer across a network path, typically measured in bits per second.
DHCP
Protocols & StandardsDynamic Host Configuration Protocol — automatically assigns IP addresses and network configuration to devices.
Subnet
Protocols & StandardsA logical subdivision of an IP network that improves security and performance by segmenting traffic.
Network Monitoring
Protocols & StandardsThe practice of continuously observing a computer network for slow or failing components.
Network Segmentation
Network SecurityDividing a computer network into smaller subnetworks to improve security and performance.