What Is a VPN? - Meaning, How It Works & More | Proofpoint US (2024)

VPN Meaning

A virtual private network (VPN) adds security and anonymity to users when they connect to web-based services and sites. A VPN hides the user’s actual public IP address and “tunnels” traffic between the user’s device and the remote server. Most users sign up for a VPN service to avoid being tracked online, and they often use it on public Wi-Fi where there are greater risks to the safety of their data.

Cybersecurity Education and Training Begins Here

Start a Free Trial

Here’s how your free trial works:

  • Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure
  • Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days
  • Experience our technology in action!
  • Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks

Fill out this form to request a meeting with our cybersecurity experts.

Thank you for your submission.

Why Do I Need a VPN?

When you make a connection to a web server, your browser performs a lookup on the domain name from Domain Name Services (DNS) servers, gets the IP address, and then connects to the server. In most cases, the connection is encrypted using SSL/TLS. Even with SSL/TLS, numerous attacks on public Wi-Fi are possible. For example, a clever attacker can perform a downgrade on the version of TLS used to encrypt data, making communication vulnerable to brute force.

With a VPN added to the connection, the VPN service packages data in its own encryption and sends it across the network. The targeted server sees the VPN’s public IP address instead of the user’s public IP address. Should an attacker hijack the connection and eavesdrop on data, good VPN encryption eliminates the possibility of a brute force opportunity, which discloses data in a cryptographically insecure connection.

How to Use a VPN

The first step in VPN setup is finding a provider that’s right for you. Several VPN providers are available, but each one has its pros and cons. For example, you need a provider with a protocol that all devices support. It should be easy to set up, available from any geolocation, and provide cryptographically secure encryption for adequate security in public Wi-Fi use.

A main differentiating factor between a good VPN and one that offers little advantages is the number of users on a single IP address. Spammers and malicious threat actors often also use a VPN, meaning some service providers block VPN IP addresses. Service providers can download a list of VPN IP addresses and block them from accessing local services. Good VPN offers private IP addresses, which costs more but also offers increased freedom and anonymity on the Internet.

After you choose a VPN, you then must configure your device to use it. These configurations are specific to each VPN provider, so yours should equip you with their step-by-step instructions. Some VPN providers give you an install file to help with the setup process, which is helpful if you are unfamiliar with operating-system configurations.

How VPN Works

A VPN is an intermediary between your computer and the targeted server. Instead of relying on a browser to encrypt communication between your device and the server, the VPN adds its own encryptions and routes communication via its own servers. You often hear the term “tunneling” when it comes to VPN services. The idea is that the VPN service opens a “tunnel” between you and the targeted server. Then, the VPN sends your data through its “tunnel” so that no one else on the network can eavesdrop and hijack your data.

Technically, the VPN sets up a connection where your device communicates on the VPN network instead of the local network, including public Wi-Fi. You authenticate with the VPN server using your stored credentials and then receive a connection to the VPN servers. With the tunnel set up, you use a virtual network connection between you and the VPN server that encrypts and protects data from eavesdroppers. If you use an SSL/TLS connection, the data is encrypted and then encrypted again using the VPN service. It adds double encryption to your communication, improving the security of your data.

Remember, when connected to a VPN server, the IP address shown to the target server is the VPN server’s IP address. If the VPN server is virtually or physically located in another country, the target web server will identify your location as the VPN country location.

How to Set Up a VPN

To set up a VPN, you need to configure the operating system to use it instead of simply using the browser. Once configured, any connection to the internet and remote web services will use the VPN server. The settings used to connect to the VPN server depend on the service that you choose. To set up a VPN in Windows, follow these steps.

Type “VPN” into the search bar, and the VPN settings window opens.

What Is a VPN? - Meaning, How It Works & More | Proofpoint US (1)

Click the “Add a VPN connection” option to open a window that displays the information required to connect to a VPN.

The information that you enter in this window depends on your service provider. All information is supplied to you when you set up your account. If your provider sent you an installation file, use that to set up the service rather than manually configuring and installing protocols.

What Is a VPN? - Meaning, How It Works & More | Proofpoint US (2)

VPN Alternatives for Business

While VPNs are beneficial for individual users, VPNs are not always the best option for businesses. It adds a layer of risk and must be monitored for suspicious activity. It’s an added risk that breaks the “no privilege” model used in secure systems.

Instead of working with a VPN, businesses could choose to implement:

  • Identification and access management. An IAM provider incorporates network credentials with remote servers and makes the secure connection a part of the corporate environment. For example, Amazon Web Services has an IAM service that can be used to connect with its remote servers.
  • Privileged access management (PAM). By implementing PAM, businesses can create high-level credentials that require increased security. Credential strategies include rotating keys frequently, 12-character passwords, system obfuscations, and better data access controls.
  • Vendor privileged access management (VPAM). Instead of giving vendors and third-party contractors direct access to servers, a VPAM system separates employees from other credentials. By separating these credentials, organizations can more closely monitor activity by third-party vendors and contractors who might not secure credentials as closely as they should.

VPN Alternatives for Enterprises

VPNs also have limited use for enterprise organizations. VPN infrastructure does not support a zero-trust cybersecurity model, which is essential for organizations that rely on cloud applications and remote workers.

Today, access to reliable cloud-hosted applications and data is essential for productivity. Zero trust network access (ZTNA) works like a trusted broker that mediates connectivity between users and applications. ZTNA isolates resources from the internet and protects them from outside threats.

Instead of a VPN, enterprise organizations should consider software-defined perimeter (SDP). Rather than focusing on securing the network, SDP works to secure users, applications, and the connections between them by:

  • Granting access only after both the user and the device have been authenticated
  • Assigning each device a unique identifier for granular data access permissions

Because SDP requires granular access permissions and device identification, it generates detailed audit trails that are useful for incident response and analysis.

Related Resources

Blog New Research Shows Organizations Struggle to Protect Against Cloud and Web Threats
E-book Ransomware Survival Guide
White Paper From VPN to SDP: Implementation Guide
Blog 3 Reasons to Ditch Your VPN for Secure Enterprise Remote Access

See more resources

Subscribe to the Proofpoint Blog

Ready to Give Proofpoint a Try?

Start with a free Proofpoint trial.

Get Protected

What Is a VPN? - Meaning, How It Works & More | Proofpoint US (2024)

FAQs

What Is a VPN? - Meaning, How It Works & More | Proofpoint US? ›

How VPN Works. A VPN is an intermediary between your computer and the targeted server. Instead of relying on a browser to encrypt communication between your device and the server, the VPN adds its own encryptions and routes communication via its own servers.

How does a VPN work in simple terms? ›

A VPN, which stands for virtual private network, protects its users by encrypting their data and masking their IP addresses. This hides their browsing activity, identity, and location, allowing for greater privacy and autonomy. Anyone seeking a safer, freer, and more secure online experience could benefit from a VPN.

Should VPN be on or off? ›

Should I leave my VPN on all the time? Yes, you should leave your VPN on all the time. VPNs offer the best online security, so keeping it on will protect you against data leaks and cyberattacks, especially while you're using public Wi-Fi. It can also safeguard against intrusive snoopers such as ISPs or advertisers.

What is VPN and is it worth having? ›

The internet is full of bad actors looking to steal your data. Virtual Private Networks (VPNs) are your protective barriers that safeguard you from these digital intruders. Without a VPN, you're at risk, much like carrying money openly in an unsafe area.

How do I turn on VPN? ›

  1. If you haven't already, add a VPN.
  2. Open your device's Settings app.
  3. Tap Network & internet. VPN. ...
  4. Next to the VPN you want to change, tap Settings .
  5. Turn Always-on VPN on or off. If you've set up a VPN through an app, you won't have the always-on option.
  6. If needed, tap Save.

Are VPNs free? ›

In short, most free VPNs just can't do what a premium VPN can—but they're not supposed to. The best VPNs give you far more than most free services (despite their claims), while a free VPN is designed to give you the most basic level of protection—everything else is a bonus.

When should I use a VPN on my phone? ›

For some time now, we've recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop on the other devices transmitting data on them. With a VPN, any connection becomes a secure connection, which includes public Wi-Fi.

Is there a downside to always using a VPN? ›

Slower connection

The encryption process and routing your traffic through remote servers can slow down your internet connection.

When shouldn't I use VPN? ›

If you don't want your internet connection to be unpredictable at times, it's best not to download a VPN. Many reputable services can offer fast servers, but encrypting all your online activity can sometimes slow down connection speeds. The second most common downside to using a VPN is also linked to unpredictability.

Do you need a VPN on home Wi-Fi? ›

Yes, you need a VPN to protect your online activity, hide your IP addresses, and keep your data safe. A VPN should be the cornerstone of your online privacy and security at home, work, or public places.

How much do VPNs cost? ›

The average cost of a VPN per month is often around $3 to $10. This is typically true for most VPNs, including popular services such as NordVPN and ExpressVPN. But pricing could vary depending on multiple factors. Each VPN provider could charge different rates depending on how popular they are.

Does a VPN slow down your internet? ›

A VPN will slow down your internet connection. With a premium VPN (Virtual Private Network), that slowdown should be unnoticeable. But no matter whether it is paid or free, a VPN will slow down your connection because it needs some of that bandwidth for encryption purposes. And without encryption, a VPN is just a VN.

Is it overkill to use a VPN? ›

For most, a standard VPN provides enough online security and privacy. A multihop VPN is overkill in these cases. Typical internet use: Most internet users can enjoy excellent protection through a standard VPN, and by exercising safe online habits such as visiting only secure websites (those using https in their URLs).

Do you have to pay for a VPN? ›

So while free VPNs may work in some cases, if you need a VPN for long-term use across all of your devices, you will most likely want to pay for a VPN subscription.

How do I use VPN for the first time? ›

Once you've purchased a subscription, download the native VPN app, create an account, or log in if you already have one. Then, choose a VPN server and click “Connect” in the VPN app. Some VPN providers recommend which server to connect to based on your location, which is helpful if you're new to a VPN.

How do you know if your VPN is on? ›

To see if you're using a proxy/VPN online, go to www.whatismyproxy.com. It will say if you're connected to a proxy or not. PC: Check under your WiFi settings, to see if there is a VPN/proxy showing up.

How to use a VPN for dummies? ›

How to Use a VPN?
  1. Download and install the PureVPN app on your chosen device.
  2. Log in using the VPN credentials provided to you through email.
  3. Select your preferred Mode (Stream, Internet Freedom, Security/Privacy, File-Sharing, or Dedicated IP).
  4. Connect to any server location.
  5. Hop on the Internet and you're set to go!
Jun 25, 2024

How do you actually use a VPN? ›

How to use a VPN
  1. First, you'll need to install a VPN app and sign in with your account credentials.
  2. Then, select a VPN server to use. For the fastest possible speeds, choose a server geographically close. ...
  3. After that, enable your VPN -- you'll usually click a button that says “Connect.” Now, your VPN should be enabled.
Apr 26, 2024

Can VPN be tracked? ›

You can't be tracked using a VPN because it encrypts your data. As a result, your ISP or bad actors can't get any information out of your traffic. They only see the VPN server's IP address (e.g. if you're connected to a US server, the US IP address is visible), while your real IP and online activities stay hidden.

Does VPN change your location? ›

A VPN changes your real IP address to that of a VPN server. This makes your traffic look like it's coming from the location of the VPN server, not your actual physical location. Depending on your VPN service, this IP may rotate every 5 to 10 minutes or stay the same for as long as you're connected.

Top Articles
What To Do If MetaMask Has Stopped Working In Your Country
What is a Seed Phrase? Everything You Need to Know [2023] | BitPay
Best Pizza Novato
Best Big Jumpshot 2K23
Combat level
2024 Fantasy Baseball: Week 10 trade values chart and rest-of-season rankings for H2H and Rotisserie leagues
Crossed Eyes (Strabismus): Symptoms, Causes, and Diagnosis
Academic Integrity
Red Wing Care Guide | Fat Buddha Store
Doby's Funeral Home Obituaries
Craigslist Chautauqua Ny
About Us | TQL Careers
Scenes from Paradise: Where to Visit Filming Locations Around the World - Paradise
Tnt Forum Activeboard
Iu Spring Break 2024
Buy Swap Sell Dirt Late Model
Sprinkler Lv2
Lowes Undermount Kitchen Sinks
Tyler Sis University City
Jc Green Obits
Marion City Wide Garage Sale 2023
The Listings Project New York
How to Make Ghee - How We Flourish
Horn Rank
Craiglist.nj
Vera Bradley Factory Outlet Sunbury Products
Waters Funeral Home Vandalia Obituaries
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
County Cricket Championship, day one - scores, radio commentary & live text
Chadrad Swap Shop
Play 1v1 LOL 66 EZ → UNBLOCKED on 66games.io
Graphic Look Inside Jeffrey Dresser
Stolen Touches Neva Altaj Read Online Free
Nsu Occupational Therapy Prerequisites
Devin Mansen Obituary
The Mad Merchant Wow
Shoreone Insurance A.m. Best Rating
Ise-Vm-K9 Eol
Author's Purpose And Viewpoint In The Dark Game Part 3
Three V Plymouth
Craigslist Woodward
VerTRIO Comfort MHR 1800 - 3 Standen Elektrische Kachel - Hoog Capaciteit Carbon... | bol
The Cutest Photos of Enrique Iglesias and Anna Kournikova with Their Three Kids
Sky Dental Cartersville
Ouhsc Qualtrics
4Chan Zelda Totk
Santa Ana Immigration Court Webex
Sleep Outfitters Springhurst
Diamond Desires Nyc
Vcuapi
Tamilyogi Cc
OSF OnCall Urgent Care treats minor illnesses and injuries
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 5900

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.