SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
VPN with iOS
Which type of virtual private network is best for you?
Cortado
White Paper
VPN
Content
Outline .....................................................................................................................................................3
1. VPN is still the most secure alternative ..............................................................................4
	 1.1 Why are mobile devices changing the traditional VPN model ............................5
2. These variables make it harder to adapt VPN to smartphones and tablets .....6
3. The various VPNs with iOS at a glance ................................................................................7
	 3.1 VPN clients on devices: Standard VPN ..................................................................................7
	 3.2 Selective VPN: VPN on Demand ................................................................................................9
	 3.3 Selective Per App VPN: Per App VPN .................................................................................10
	 3.4 Complete control: Always-on VPN .........................................................................................11
4. Setting up your preferred VPN with Cortado Corporate Server ...........................12
	 4.1 Standard VPN ..........................................................................................................................................12
	 4.2 VPN on Demand ...................................................................................................................................13
	 4.3 Per App VPN ............................................................................................................................................14
	 4.4 Always-on VPN ......................................................................................................................................14
Summary ..............................................................................................................................................15
Follow Cortado: facebook twitter youtube linkedin
3VPN with iOS | December 2014 | www.cortado.com | www.thinprint.com
Outline
Situation. Mobile devices are challenging the traditional VPN model
The virtual private network is still seen today as the most secure and practical data
communications solution for both companies and end users. 1
However, the tradi-
tional VPN is very task-specific. Staff outside the company set up a connection to
the corporate network on their laptops or PCs, in order to edit documents. After ac-
cess to the documents, the connection is severed again. The arrival of smartphones
and tablets in the corporate world and the changing behavior of users mean that
the standard VPN is in many cases no longer sufficient.
Problem. 
Many variables make it harder to adapt VPNs to smartphones and tablets
Depending on the security requirement and user behavior, you may be faced with
the following issues regarding the virtual private network: “I offer BYOD and want
only the business apps to use the VPN connection.” Or: “I want every instance of
data communication that is sent from a mobile device to be routed via the VPN.” Or:
“What happens when the VPN server has to decide which website or app can go
through the tunnel, how does the device cope with that?” In addition to security and
user behavior, you also need to check the technical preconditions. These include
the possibilities of your VPN provider, of the mobile devices, and of the mobile
operating system.
Solution. Find the right virtual private network with iOS
Since iOS 8, Apple has been offering its customers a wide range of VPN settings.
This can satisfy the full extent of your security requirements and cover the antici-
pated user behavior of your staff. With iOS, you as a company have the benefit that
the device and the operating system are one and the same, and thus easier to
manage. However, iOS is not the answer on its own. A suitable enterprise mobility
solution that supports the different VPNs is also important. The VPN provider must
also work smoothly with the enterprise mobility solution and the iPhone/iPad.
Result. 
VPN, Cortado Corporate Server, and iOS: The perfect threesome for security
Thanks to a perfect combination, consisting of the Cortado Corporate Server enter-
prise mobility solution, the appropriate type of VPN, and iOS 8, the door to secure
and successful implementation of enterprise mobility is wide open. From now on,
your staff will work securely and productively and thus you will create the basis for
your mobile company.
1 Schuhmacher, Dr. J.: VPN - Virtual Private Network, URL: http://www.controlling21.de/
firma/artikel/vpn.htm (November 2014)
Follow Cortado:: facebook twitter youtube linkedin
Download this white paper
for free
from the Cortado Corporate Server
website today!
www.cortado.com
http://bit.ly/1GoohnE

Mais conteúdo relacionado

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Destaque

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

VPN with iOS Which type of virtual private network is best for you?

  • 1. VPN with iOS Which type of virtual private network is best for you? Cortado White Paper VPN
  • 2. Content Outline .....................................................................................................................................................3 1. VPN is still the most secure alternative ..............................................................................4 1.1 Why are mobile devices changing the traditional VPN model ............................5 2. These variables make it harder to adapt VPN to smartphones and tablets .....6 3. The various VPNs with iOS at a glance ................................................................................7 3.1 VPN clients on devices: Standard VPN ..................................................................................7 3.2 Selective VPN: VPN on Demand ................................................................................................9 3.3 Selective Per App VPN: Per App VPN .................................................................................10 3.4 Complete control: Always-on VPN .........................................................................................11 4. Setting up your preferred VPN with Cortado Corporate Server ...........................12 4.1 Standard VPN ..........................................................................................................................................12 4.2 VPN on Demand ...................................................................................................................................13 4.3 Per App VPN ............................................................................................................................................14 4.4 Always-on VPN ......................................................................................................................................14 Summary ..............................................................................................................................................15 Follow Cortado: facebook twitter youtube linkedin
  • 3. 3VPN with iOS | December 2014 | www.cortado.com | www.thinprint.com Outline Situation. Mobile devices are challenging the traditional VPN model The virtual private network is still seen today as the most secure and practical data communications solution for both companies and end users. 1 However, the tradi- tional VPN is very task-specific. Staff outside the company set up a connection to the corporate network on their laptops or PCs, in order to edit documents. After ac- cess to the documents, the connection is severed again. The arrival of smartphones and tablets in the corporate world and the changing behavior of users mean that the standard VPN is in many cases no longer sufficient. Problem. Many variables make it harder to adapt VPNs to smartphones and tablets Depending on the security requirement and user behavior, you may be faced with the following issues regarding the virtual private network: “I offer BYOD and want only the business apps to use the VPN connection.” Or: “I want every instance of data communication that is sent from a mobile device to be routed via the VPN.” Or: “What happens when the VPN server has to decide which website or app can go through the tunnel, how does the device cope with that?” In addition to security and user behavior, you also need to check the technical preconditions. These include the possibilities of your VPN provider, of the mobile devices, and of the mobile operating system. Solution. Find the right virtual private network with iOS Since iOS 8, Apple has been offering its customers a wide range of VPN settings. This can satisfy the full extent of your security requirements and cover the antici- pated user behavior of your staff. With iOS, you as a company have the benefit that the device and the operating system are one and the same, and thus easier to manage. However, iOS is not the answer on its own. A suitable enterprise mobility solution that supports the different VPNs is also important. The VPN provider must also work smoothly with the enterprise mobility solution and the iPhone/iPad. Result. VPN, Cortado Corporate Server, and iOS: The perfect threesome for security Thanks to a perfect combination, consisting of the Cortado Corporate Server enter- prise mobility solution, the appropriate type of VPN, and iOS 8, the door to secure and successful implementation of enterprise mobility is wide open. From now on, your staff will work securely and productively and thus you will create the basis for your mobile company. 1 Schuhmacher, Dr. J.: VPN - Virtual Private Network, URL: http://www.controlling21.de/ firma/artikel/vpn.htm (November 2014)
  • 4. Follow Cortado:: facebook twitter youtube linkedin Download this white paper for free from the Cortado Corporate Server website today! www.cortado.com http://bit.ly/1GoohnE