A lot has been said about VPNs, but we will focus on the little-known side.

As more and more employees “come to work” from co-working rooms, libraries, cafes, subways, hotels and other dubious places, a remote access tool is needed that allows easy connectivity from any environment.

The multiprotocol solutions to this problem are dizzying: L2TP/IPsec, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, Tor bridge, WireGuard. Their main drawback is that these tools can be not always convenient for end users.

We came across a service that combines simplicity (as usual, fits in one button), scalability and security (with a certain degree of confidence, since the code is closed). NCP engineering specializes in enterprise VPN services and offers encrypted data transmission with additional biometric protection (e.g., by fingerprint or facial recognition).

NCP detects exactly what is preventing the connection to the employer’s VPN gateway. If the network environment blocks communication, such as a firewall only allowing HTTPS traffic, the NCP VPN client automatically uses HTTPS emulation mode outside the VPN tunnel. This allows the VPN client to establish an encrypted tunnel to the VPN gateway on the corporate network over the HTTPS port while meeting all security policy requirements.

The NCP Secure Enterprise VPN Server supports tunneling over multiple protocols, allowing you to choose VPN technology depending on what obstacles the user’s network environment poses. At the same time, the system can serve anywhere from 1 to 10,000 users simultaneously – this can be not only people, but also industrial internet of things devices – to securely handle all incoming traffic and monitor the infrastructure.

As always, comments are welcome – add data on the topic of the secure internet. We’ve talked mostly about the SMB environment, but we’d love it if you could share any of your favorite enterprise security tools.