In this month’s update, we’re making it even easier to purchase Access Server connections through AWS, sharing insights from our latest webinar and research, and offering a complimentary Gartner® report on universal ZTNA. Whether you're scaling secure access or exploring what's next for VPNs, we’ve got resources to support your journey.
It’s Easier Than Ever to Purchase Access Server Connections Through AWS
You can now purchase connections from our portal using your AWS account, giving you flexibility to consolidate billing and simplify procurement. We have streamlined the purchasing process by allowing you to make an immediate purchase directly from our portal using your AWS account, without needing to navigate away to the AWS Marketplace listing. Purchases are made using existing AWS credentials and payment preferences, leveraging AWS’s robust security protocols to protect you against fraud and unauthorized access.
Quickly get started today with just three easy steps, and deploy Access Server on AWS in minutes!
Sign in to the Access Server Portal (or sign up if you haven’t already).
With the new Buy with AWS option, you can also purchase an AWS contract with a set number of connections through our Access Server PAYG subscription (choose between monthly or annual billing). To learn more, see our PAYG documentation.
WEBINAR ON DEMAND — Secure Access at Scale: How Access Server Powers Your Zero Trust Network
Access Server is more powerful than you think. If you missed our latest webinar earlier this week, we have good news: you can watch the replay here!
In Secure Access at Scale: How Access Server Powers Your Zero Trust Network, we show you:
Key features: See how Access Server can help your organization embrace Zero Trust with ease by integrating with MFA and device verification to ensure only trusted users and devices gain access — and only from approved locations.
Real-world use cases: Learn how to upgrade and modernize outdated, overly complex VPN solutions. We’ll show how to replace legacy or insecure VPNs to improve performance and meet your compliance requirements.
Live demo: Watch Access Server in action — see how easy it is to deploy, navigate, and scale.
New Research from OpenVPN and ESG: The Future of VPNs
In case you missed the big announcement last month, OpenVPN partnered with Enterprise Strategy Group (ESG) to explore how organizations are securing remote access in a changing digital landscape. This research report on secure access technology trends draws on insights from 200 IT and cybersecurity businesses and reveals key trends — including why legacy VPNs are falling short and how businesses are adapting.
As hybrid work grows and networks evolve, the need for flexible, scalable VPN solutions has never been clearer.
Get Your Complimentary Gartner® Report on Universal ZTNA
By now, you likely have a ZTNA strategy. But what about universal ZTNA? And do you know how to use it for secure remote access?
According to a Gartner® report, “Universal zero-trust network access is expected to grow to widespread adoption, greater than 40%, by 2027.” What’s driving the change? The need for secure remote access for hybrid teams.
Are you ready for the shift? Read the complimentary Gartner report, Emerging Tech: Universal ZTNA Drives Secure Access Consolidation, to learn more.
PHORONIX — Linux 6.16 Brings Major Networking Upgrades — Including Performance Boosts for OpenVPN
The upcoming Linux 6.16 kernel is making waves with major networking improvements, and OpenVPN is part of the story. As covered by Phoronix, the latest updates include performance optimizations for the kernel's crypto API and socket handling — both of which directly benefit OpenVPN users by enhancing speed and efficiency.
These changes are part of a broader effort to modernize Linux networking — and it’s exciting to see our technology included in the mix.
FORBES — The Future of Cybersecurity Leadership: Universal Zero Trust
In his latest article for Forbes, OpenVPN CEO Francis Dinha explores the next evolution of cybersecurity leadership — and why a Universal Zero Trust strategy is no longer optional. As threats grow more sophisticated, leaders must embrace Zero Trust not just as a security model, but as a guiding principle for protecting modern networks.
It’s a forward-looking piece packed with insight and a clear call to action for organizations of all sizes.
Passkeys for the people. Troy Hunt provides an understandable overview of passkeys, including what they are, how to set them up, and how to use them across platforms such as WhatsApp, LinkedIn, and Ubiquiti. Do you have a YubiKey? Troy Hunt: Passkeys for Normal People
Did you know you can reply to this email? Feel free to send feedback, questions, comments, suggestions for future topics, webinars, or your favorite summertime treat. 🍦