New York, New York City – January 17, 2018 – KeepSolid, a developer known for VPN Unlimited, today goes B2B, launches Business VPN by KeepSolid on Windows, macOS, iOS, and Android. Business VPN is a security solution that lets your team connect to the same server and have access to the data they want to protect from prying eyes. It will allow its users to connect to the corporate VPN server and be within one local network from anywhere in the world.
Business VPN by KeepSolid will rid you off servers deployment and maintenance. It has a convenient account management panel, which doesn't require any special tech knowledge to be operated. An administrator chooses a plan, invites users, creates teams, and selects the servers available to a certain team. Team members will just have to download the app and create their passwords. It's as easy as this.
Thanks to military-grade encryption, which are AES-128 and AES-256, protocols, Business VPN by KeepSolid will ensure all the data stays unavailable to anyone outside the company.
The app is free to download, has a 7-day free trial, and is a delight to use.
More information: https://www.keepsolid.com/business-vpn
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities