SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
VPN with iOS
Which type of virtual private network is best for you?
Cortado
White Paper
VPN
Content
Outline .....................................................................................................................................................3
1. VPN is still the most secure alternative ..............................................................................4
	 1.1 Why are mobile devices changing the traditional VPN model ............................5
2. These variables make it harder to adapt VPN to smartphones and tablets .....6
3. The various VPNs with iOS at a glance ................................................................................7
	 3.1 VPN clients on devices: Standard VPN ..................................................................................7
	 3.2 Selective VPN: VPN on Demand ................................................................................................9
	 3.3 Selective Per App VPN: Per App VPN .................................................................................10
	 3.4 Complete control: Always-on VPN .........................................................................................11
4. Setting up your preferred VPN with Cortado Corporate Server ...........................12
	 4.1 Standard VPN ..........................................................................................................................................12
	 4.2 VPN on Demand ...................................................................................................................................13
	 4.3 Per App VPN ............................................................................................................................................14
	 4.4 Always-on VPN ......................................................................................................................................14
Summary ..............................................................................................................................................15
Follow Cortado: facebook twitter youtube linkedin
3VPN with iOS | December 2014 | www.cortado.com | www.thinprint.com
Outline
Situation. Mobile devices are challenging the traditional VPN model
The virtual private network is still seen today as the most secure and practical data
communications solution for both companies and end users. 1
However, the tradi-
tional VPN is very task-specific. Staff outside the company set up a connection to
the corporate network on their laptops or PCs, in order to edit documents. After ac-
cess to the documents, the connection is severed again. The arrival of smartphones
and tablets in the corporate world and the changing behavior of users mean that
the standard VPN is in many cases no longer sufficient.
Problem. 
Many variables make it harder to adapt VPNs to smartphones and tablets
Depending on the security requirement and user behavior, you may be faced with
the following issues regarding the virtual private network: “I offer BYOD and want
only the business apps to use the VPN connection.” Or: “I want every instance of
data communication that is sent from a mobile device to be routed via the VPN.” Or:
“What happens when the VPN server has to decide which website or app can go
through the tunnel, how does the device cope with that?” In addition to security and
user behavior, you also need to check the technical preconditions. These include
the possibilities of your VPN provider, of the mobile devices, and of the mobile
operating system.
Solution. Find the right virtual private network with iOS
Since iOS 8, Apple has been offering its customers a wide range of VPN settings.
This can satisfy the full extent of your security requirements and cover the antici-
pated user behavior of your staff. With iOS, you as a company have the benefit that
the device and the operating system are one and the same, and thus easier to
manage. However, iOS is not the answer on its own. A suitable enterprise mobility
solution that supports the different VPNs is also important. The VPN provider must
also work smoothly with the enterprise mobility solution and the iPhone/iPad.
Result. 
VPN, Cortado Corporate Server, and iOS: The perfect threesome for security
Thanks to a perfect combination, consisting of the Cortado Corporate Server enter-
prise mobility solution, the appropriate type of VPN, and iOS 8, the door to secure
and successful implementation of enterprise mobility is wide open. From now on,
your staff will work securely and productively and thus you will create the basis for
your mobile company.
1 Schuhmacher, Dr. J.: VPN - Virtual Private Network, URL: http://www.controlling21.de/
firma/artikel/vpn.htm (November 2014)
Follow Cortado:: facebook twitter youtube linkedin
Download this white paper
for free
from the Cortado Corporate Server
website today!
www.cortado.com
http://bit.ly/1GoohnE

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

VPN with iOS Which type of virtual private network is best for you?

  • 1. VPN with iOS Which type of virtual private network is best for you? Cortado White Paper VPN
  • 2. Content Outline .....................................................................................................................................................3 1. VPN is still the most secure alternative ..............................................................................4 1.1 Why are mobile devices changing the traditional VPN model ............................5 2. These variables make it harder to adapt VPN to smartphones and tablets .....6 3. The various VPNs with iOS at a glance ................................................................................7 3.1 VPN clients on devices: Standard VPN ..................................................................................7 3.2 Selective VPN: VPN on Demand ................................................................................................9 3.3 Selective Per App VPN: Per App VPN .................................................................................10 3.4 Complete control: Always-on VPN .........................................................................................11 4. Setting up your preferred VPN with Cortado Corporate Server ...........................12 4.1 Standard VPN ..........................................................................................................................................12 4.2 VPN on Demand ...................................................................................................................................13 4.3 Per App VPN ............................................................................................................................................14 4.4 Always-on VPN ......................................................................................................................................14 Summary ..............................................................................................................................................15 Follow Cortado: facebook twitter youtube linkedin
  • 3. 3VPN with iOS | December 2014 | www.cortado.com | www.thinprint.com Outline Situation. Mobile devices are challenging the traditional VPN model The virtual private network is still seen today as the most secure and practical data communications solution for both companies and end users. 1 However, the tradi- tional VPN is very task-specific. Staff outside the company set up a connection to the corporate network on their laptops or PCs, in order to edit documents. After ac- cess to the documents, the connection is severed again. The arrival of smartphones and tablets in the corporate world and the changing behavior of users mean that the standard VPN is in many cases no longer sufficient. Problem. Many variables make it harder to adapt VPNs to smartphones and tablets Depending on the security requirement and user behavior, you may be faced with the following issues regarding the virtual private network: “I offer BYOD and want only the business apps to use the VPN connection.” Or: “I want every instance of data communication that is sent from a mobile device to be routed via the VPN.” Or: “What happens when the VPN server has to decide which website or app can go through the tunnel, how does the device cope with that?” In addition to security and user behavior, you also need to check the technical preconditions. These include the possibilities of your VPN provider, of the mobile devices, and of the mobile operating system. Solution. Find the right virtual private network with iOS Since iOS 8, Apple has been offering its customers a wide range of VPN settings. This can satisfy the full extent of your security requirements and cover the antici- pated user behavior of your staff. With iOS, you as a company have the benefit that the device and the operating system are one and the same, and thus easier to manage. However, iOS is not the answer on its own. A suitable enterprise mobility solution that supports the different VPNs is also important. The VPN provider must also work smoothly with the enterprise mobility solution and the iPhone/iPad. Result. VPN, Cortado Corporate Server, and iOS: The perfect threesome for security Thanks to a perfect combination, consisting of the Cortado Corporate Server enter- prise mobility solution, the appropriate type of VPN, and iOS 8, the door to secure and successful implementation of enterprise mobility is wide open. From now on, your staff will work securely and productively and thus you will create the basis for your mobile company. 1 Schuhmacher, Dr. J.: VPN - Virtual Private Network, URL: http://www.controlling21.de/ firma/artikel/vpn.htm (November 2014)
  • 4. Follow Cortado:: facebook twitter youtube linkedin Download this white paper for free from the Cortado Corporate Server website today! www.cortado.com http://bit.ly/1GoohnE