All Blog Posts for Secure connection

  • ITGix is an ISO/ IEC 27001:2013 certified company

    ITGix is an ISO/ IEC 27001:2013 certified company

    What is ISO/IEC 27001? ISO/IEC 27001 is an information security standard, part of the ISO/IEC 27000 family of standards, which specifies a management system that is intended to bring information security under management control and gives specific requirements. It is a security standard that outlines the suggested requirements for building, monitoring and improving an information security management system (ISMS). An ISMS is a set of policies for protecting and managing an enterprise’s sensitive information, e.g., financial data, intellectual property, customer details and employee records.

  • Setting up a simple open source peer-to-peer VPN

    Setting up a simple open source peer-to-peer VPN

    VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet which can be very beneficial for some use cases. VPNs can be used for many things, for example - access region-restricted websites, shield your browsing activity from bad guys on public Wi-Fi, connect and use local resources which are inaccessible from the outside world or simply create a secure network between your servers and isolate them. So, what are the common steps for creating a VPN. You need to first connect to the public internet through the ISP (Internet Service Provider), then initiate a VPN using a client software. Sounds easy, right? Well it depends on the software you choose, whereby most of the VPN solutions follow the client-server principle. That means, all nodes connect to e central server which is the central point to all others. By such environment, the whole traffic passes through the central server creating a star topology, so this server needs lots of bandwidth. In case that the central server fails and it’s not able to handle the whole traffic, the VPN will go down and the other members will not be able to communicate. This is the main disadvantage by such setting. So, if you don’t want to have that single point of failure, you can use a full mesh topology, where every participant talk to the others without having a central server. If one of them fails, the other members will not be affected. A good, simple and reliable peer-to-peer/full mesh solution is the PeerVPN.