
{"id":2679,"date":"2013-10-15T00:00:00","date_gmt":"2013-10-15T00:00:00","guid":{"rendered":"http:\/\/otava.test\/encryption-video-what-is-a-virtual-private-network-vpn\/"},"modified":"2013-10-15T00:00:00","modified_gmt":"2013-10-15T00:00:00","slug":"encryption-video-what-is-a-virtual-private-network-vpn","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/","title":{"rendered":"Encryption Video: What is a Virtual Private Network (VPN)?"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a> by explaining what a virtual private network is and the options a company has to secure data transfer over the internet.<\/p>\n<p>A virtual private network (VPN) can be implemented site to site &#8211; this method is especially beneficial for satellite offices in different locations. Without buying an expensive point to point link, a VPN sends encrypted data over the Internet using symmetric encryption.<\/p>\n<p>Using a pre-shared key, symmetric encryption requires two admins to agree to the parameters of the VPN tunnel, such as the type of encryption and the shared key. After that, they would establish a secure link across the Internet from a branch office back to the headquarters &#8211; a very common use case for this type of VPN that allows users to send sensitive data over the Internet that they might not normally send due to security issues.<\/p>\n<p>Another type of VPN is mobile VPN. You can use an SSL via web browser or desktop client in order to access data remotely via your laptop or other workstation. This is useful for companies in industries that need to view financial or healthcare data securely and remotely.<\/p>\n<p>View our videos in the data encryption series <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/videos\/\">here<\/a>, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the <a href=\"https:\/\/www.onlinetech.com\/events\/detroit-secureworld-2013\">Detroit SecureWorld Expo<\/a>:<\/p>\n<p><em><strong>Industry Expert Panel: Network Security<\/strong><\/em><br \/>\nRoom: Suite 3<br \/>\nTime: 1:15pm &#8211; 2:15pm<br \/>\nDescription:\u00a0Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure.<\/p>\n<figure style=\"width: 480px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/what-is-a-virtual-private-network-vpn\"><img loading=\"lazy\" decoding=\"async\" title=\"What is a Virtual Private Network? View video on our site.\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" alt=\"What is a Virtual Private Network? View video on our site.\" width=\"480\" height=\"360\" \/><\/a><figcaption class=\"wp-caption-text\">What is a Virtual Private Network? View video on our site.<\/figcaption><\/figure>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a>\u00a0page.<\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p><a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Encrypted Cloud Data\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\" alt=\"Encrypted Cloud Data\" width=\"239\" height=\"186\" \/><\/a><\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining what a virtual private network is and the options a company has to secure data transfer over the internet. A virtual private network (VPN) can be implemented site to site &#8211; this method is especially beneficial for satellite offices in different locations. Without buying an expensive point to point link, a VPN sends encrypted data over the Internet using symmetric encryption. Using a pre-shared key, symmetric encryption requires two admins to agree to the parameters of the VPN tunnel, such as the type of encryption and the shared key. After that, they would establish a secure link across the Internet from a branch office back to the headquarters &#8211; a very common use case for this type of VPN that allows users to send sensitive data over the Internet that they might not normally send due to security issues. Another type of VPN is mobile VPN. You can use an SSL via web browser or desktop client in order to access data remotely via your laptop or other workstation. This is useful for companies in industries that need to view financial&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2679","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption Video: What is a Virtual Private Network (VPN)? | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Video: What is a Virtual Private Network (VPN)?\" \/>\n<meta property=\"og:description\" content=\"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining what a virtual private network is and the options a company has to secure data transfer over the internet. A virtual private network (VPN) can be implemented site to site &#8211; this method is especially beneficial for satellite offices in different locations. Without buying an expensive point to point link, a VPN sends encrypted data over the Internet using symmetric encryption. Using a pre-shared key, symmetric encryption requires two admins to agree to the parameters of the VPN tunnel, such as the type of encryption and the shared key. After that, they would establish a secure link across the Internet from a branch office back to the headquarters &#8211; a very common use case for this type of VPN that allows users to send sensitive data over the Internet that they might not normally send due to security issues. Another type of VPN is mobile VPN. You can use an SSL via web browser or desktop client in order to access data remotely via your laptop or other workstation. This is useful for companies in industries that need to view financial...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-15T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Encryption Video: What is a Virtual Private Network (VPN)?\",\"datePublished\":\"2013-10-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\"},\"wordCount\":474,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\",\"url\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\",\"name\":\"Encryption Video: What is a Virtual Private Network (VPN)? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"datePublished\":\"2013-10-15T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Video: What is a Virtual Private Network (VPN)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption Video: What is a Virtual Private Network (VPN)? | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/","og_locale":"en_US","og_type":"article","og_title":"Encryption Video: What is a Virtual Private Network (VPN)?","og_description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining what a virtual private network is and the options a company has to secure data transfer over the internet. A virtual private network (VPN) can be implemented site to site &#8211; this method is especially beneficial for satellite offices in different locations. Without buying an expensive point to point link, a VPN sends encrypted data over the Internet using symmetric encryption. Using a pre-shared key, symmetric encryption requires two admins to agree to the parameters of the VPN tunnel, such as the type of encryption and the shared key. After that, they would establish a secure link across the Internet from a branch office back to the headquarters &#8211; a very common use case for this type of VPN that allows users to send sensitive data over the Internet that they might not normally send due to security issues. Another type of VPN is mobile VPN. You can use an SSL via web browser or desktop client in order to access data remotely via your laptop or other workstation. This is useful for companies in industries that need to view financial...","og_url":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/","og_site_name":"OTAVA","article_published_time":"2013-10-15T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Encryption Video: What is a Virtual Private Network (VPN)?","datePublished":"2013-10-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/"},"wordCount":474,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/","url":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/","name":"Encryption Video: What is a Virtual Private Network (VPN)? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","datePublished":"2013-10-15T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/encryption-video-what-is-a-virtual-private-network-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Encryption Video: What is a Virtual Private Network (VPN)?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2679"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2679\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2679"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}