<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Trasmissione sicura dei dati Archives - Bunker Seguridad Electrónica S.L.</title>
	<atom:link href="https://bunkerseguridad.com/it/notizie/trasmissione-sicura-dei-dati/feed/" rel="self" type="application/rss+xml" />
	<link>https://bunkerseguridad.com/it/notizie/trasmissione-sicura-dei-dati/</link>
	<description>Produzione e distribuzione di sistemi di rilevamento perimetrale in Europa.</description>
	<lastBuildDate>Wed, 14 Oct 2020 12:52:19 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://bunkerseguridad.com/it/wp-content/uploads/2021/02/cropped-Bunker-seguridad--32x32.png</url>
	<title>Trasmissione sicura dei dati Archives - Bunker Seguridad Electrónica S.L.</title>
	<link>https://bunkerseguridad.com/it/notizie/trasmissione-sicura-dei-dati/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Virtual Private Networks (VPN) for secure remote working from any location</title>
		<link>https://bunkerseguridad.com/it/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/</link>
					<comments>https://bunkerseguridad.com/it/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/#respond</comments>
		
		<dc:creator><![CDATA[Prácticas 1]]></dc:creator>
		<pubDate>Mon, 23 Mar 2020 09:00:40 +0000</pubDate>
				<category><![CDATA[Notizie]]></category>
		<category><![CDATA[KBC Networks]]></category>
		<category><![CDATA[Lavoro a distanza]]></category>
		<category><![CDATA[Trasmissione sicura dei dati]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://www.bunkerseguridad.es/en/?p=1007</guid>

					<description><![CDATA[<p>The spread of the COVID-19 creates the need to establish secure and reliable environments, so that employees can be connected to the corporate network from any remote location and have access to all the resources they need. To accomplish it, we use Virtual Private Networks (VPNs) and devices that create a virtual &#8220;tunnel&#8221; between communication [&#8230;]</p>
<p>The post <a href="https://bunkerseguridad.com/it/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/">Virtual Private Networks (VPN) for secure remote working from any location</a> appeared first on <a href="https://bunkerseguridad.com/it">Bunker Seguridad Electrónica S.L.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The spread of the COVID-19 creates the need to establish secure and reliable environments, so that employees can be connected to the corporate network from any remote location and have access to all the resources they need. To accomplish it, we use Virtual Private Networks (VPNs) and devices that create a virtual &#8220;tunnel&#8221; between communication endpoints, so the data travels encrypted.</p>
<p><strong>What does a Virtual Private Network provide?</strong></p>
<p>A VPN brings confidentiality, integrity and security of data transfer, which is crucial, especially if you have to manage confidential information or sensitive data. VPNs are becoming increasingly popular, even in private environments, because they are the most versatile professional solution for secure data sharing.</p>
<p><strong>What are the most important features a VPN should have?</strong></p>
<p>At first place, you need a private and secure connection and to achieve it, you have to use powerful cryptographic algorithms such as AES, Blowfish, Camelia, etc. The security of the encryption also depends on the size of the keys and the most used are 128, 192 and 256 bits.</p>
<p>Even though a VPN can be created using software solutions, hardware solution are less vulnerable to possible attacks and transmission problems. We recommend ThruLink<sup>TM</sup> devices from KBC Networks, which stand out for their rugged design and optimized transmission performance.</p>
<p><strong>What other advantages does a connection managed by ThruLink<sup>TM</sup> provide?</strong></p>
<ul>
<li>The quality of KBC Networks&#8217; devices is always very high, in the case of ThruLink<sup>TM</sup> that assures good resistance, reliability and quality of the connection.</li>
<li>In addition, the connection established with the server is completely encrypted. You can choose from a long list of encryptions: AES:128/192/256bits, Blowfish: 128/196/256bits, Camellia: 128/196/256bits, SHA1, SHA256, RSA: 128/196/256bits, FIPS: 140-2.</li>
<li>On the other hand, unlike the vast majority of companies that offer this service, ThruLink<sup>TM</sup> does not require the recurrent recurring license fees, nor maintenance.</li>
<li>The systems created with ThruLink<sup>TM</sup> are scalable and easy to configure.</li>
<li>Signals can be transmitted over either private and public networks.</li>
<li>The multiple failover capability ensures a stable connection.</li>
</ul>
<p><strong>What do I need to have an encrypted connection with ThruLink<sup>TM</sup>?</strong></p>
<p>You need an Internet connection (via cable, Wireless or a SIM card), a device at the work site, a device at each remote location where you want to make a connection and a computer for device configuration purposes.</p>
<p>It is noteworthy to mention that the installation of the equipment is simple and does not require advanced computer skills.</p>
<p>In situations like the one we are currently in, where it is imperative to protect the employees’ health, without interrupting customer service, we promote and recommend teleworking.</p>
<p>For more detailed and specific information on this device and its applications, please contact us.</p>
<p>The post <a href="https://bunkerseguridad.com/it/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/">Virtual Private Networks (VPN) for secure remote working from any location</a> appeared first on <a href="https://bunkerseguridad.com/it">Bunker Seguridad Electrónica S.L.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://bunkerseguridad.com/it/virtual-private-networks-vpn-for-secure-remote-working-from-any-location/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
