A Virtual Private Network (VPN) creates a secure network from an existing public network to ensure any traffic is encrypted on a user’s device before it travels the WiFi ether.
VPNs make it safer for a remote user to access sensitive network resources – such as ones heavily protected by your company – when they are working from a location where only public WiFi is available. The VPN prevents the user from web traffic being eavesdropped and sensitive information from being intercepted. In recent years, passwordless VPN authentication has become popular as users seek even greater security for their private connections.
The Internet Security Protocol (IPSec) is used in a Virtual Private Network (VPN). It establishes mutual authentication between pairs of hosts, protecting data flows. These pairs can be hosts (e.g. machines or applications), security gateways (called networks), or security gateways and hosts (network-host).
Examples of VPN vendors include NordVPN, Private Internet Access, CyberGhost, Surfshark, and TunnelBear.