Virtual private networks (VPNs) connect different locations – across several streets, but also across continents if necessary. VPNs function like an individually shielded part of the internet. Data is transmitted via a VPN as if it were passing through the “normal” internet. But at the same time, protection against third-party access is ensured.
Different sites, home offices, mobile employees:
Everyone is connected to a VPN
With our site-to-site networking, we interconnect multiple sites via the internet to form a wide area network (WAN). Employees in all sites can access data and resources via this WAN. Head office, branch, production site, representatives abroad, internal service provider, home offices, mobile employees: They are all connected with one another. Site-to-site networking is generally possible for up to 1,000 access points.
VPNs are the future: Making data and resources available to mobile employees is becoming just as important as working in a home office. With our site-to-site networking you can ensure that the highest security standards are met, irrespective from which location access is gained.
Virtual private networks can do even more. In the event of cable connection failures, VPNs serve as backup, meaning that they protect against production downtime. Many companies in Germany (especially in rural areas) are still not able to access DSL. For these companies, VPNs with UMTS or LTE are a readily available solution.
MPLS stands for multiprotocol layer switching. This process allows data packets to be forwarded via a predetermined path. In this way, the benefits of label switching are combined with the advantages of routing.
MPLS has been used since the 1990s. In those days, the amount of voice communication in data volumes was significantly higher. Prior to MPLS, two different networks for voice data and other data were necessary.
MPLS routers determine which path to send the data across when it enters the network. This means that network capacities are better exploited. MPLS allows prioritisation of individual data packets. Higher-priority data packets are forwarded more quickly.
IPSec stands for internet protocol security. The process allows for secure communication via the internet. Broadly speaking, IPSec is an extension of the Internet Protocol (IP) that makes use of encryption and authentication mechanisms.
Virtual private networks (VPNs) based on IPSec technology provide cryptographic protection of transmitted data and authentication of senders, for example. In addition, security measures such as access control and the allocation and administration of keys are possible. IPSec VPNs fulfil high standards in terms of interoperability and data integrity.
IPSec provides advantages compared to other wide area networks (WANs). IPSec is one of the few technologies that can be implemented almost anywhere. Costs for the internet bandwidth used are typically lower than with MPLS WANs. IPSec WANs can be set up in the short term and can also be used in temporary locations, for example.
However: The effort involved with setup, operation and network management is quite high. This is not a problem, though, if you opt for our network management.
An Ethernet VPN turns the LAN (Local Area Network) into a WAN (Wide Area Network). This network option is ideal for meeting high demands in terms of security and speed. Downtime is often below 0.01%, and unauthorised access to the network by third parties is rendered enormously difficult.
With extremely large bandwidths, Ethernet VPNs are also often more cost-effective than other network technologies. Ethernet VPNs are used, for instance, if two sites are to be directly linked to each other or a connection to a computer centre or a cloud is required.
LAN links or point-to-point connections are the only network option that guarantees a certain transmission quality. The technology is used when two sites are to be linked to each other, for example. LAN links can be useful, particularly if only a small distance has to be bridged between these two sites.
Your network never sleeps. Neither do we. Our network support monitors, maintains and optimises your networks around the clock all year round. Thanks to continuous monitoring we immediately detect imminent weak spots and can act accordingly via remote control without any delay.