top of page
Image by Petter Lagson

VIRTUAL PRIVATE NETWORK CONNECTIONS

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common part of a VPN connection.

​

VPN technology was developed to provide access to corporate applications and resources to remote or mobile users, and to branch offices. For security, the private network connection may be established using an encrypted layered tunneling protocol, and users may be required to pass various authentication methods to gain access to the VPN. In other applications, Internet users may secure their connections with a VPN to circumvent geo-blocking and censorship or to connect to proxy servers to protect personal identity and location to stay anonymous on the Internet. Some websites, however, block access to known VPN technology to prevent the circumvention of their geo-restrictions, and many VPN providers have been developing strategies to get around these blockades.

A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.

​

When dealing with corporate data, it is highly recommended to increase security to your phone server. Depending on your business, lots of customer data can be shared over the phone, such as PCI data (credit card data), or protected health information governed by HIPAA standards.

​

Metric Infinity infrastructure resides on Microsoft Azure. We have the tools needed to implement VPN tunnels between our Azure network and your local business location. The only thing we would require from the customer is a static IP address from your internet provider, and a VPN ready appliance that can establish a tunnel to us. If you do not have these capabilities, we can work with your team to get the necessary equipment and configure it for you. When complete, you can access the cloud PBX server just as if it was a computer located on your local network.

bottom of page