With the growing popularity of remote work, security threats are migrating from our corporate offices to our homes. Without the right security tools, this transition can leave us vulnerable. That's why businesses are looking for ways to extend corporate security tools to employees' homes. This is where a VPN concentrator comes in handy, but what is it and how does it work?
A VPN concentrator establishes multiple encrypted VPN tunnels at the same time and provides a secure and encrypted connection between different VPN nodes. Basically, a VPN concentrator creates and helps to manage multiple VPN connections remotely. It is a server-side feature.
This device extends the capabilities of a VPN router. One such tool can serve thousands of users at the same time and create a VPN tunnel for each of them. Thus, if an organization uses a VPN concentrator, its employees can securely connect to the company’s home network from anywhere in the world.
VPN concentrators stand at the forefront of the network, usually beneath or next to a firewall. It is a hardware device that comes with dedicated software that supports a specific number of VPN connections. A VPN concentrator does a similar job to a VPN (encrypts outgoing and incoming data and uses security protocols to create safe tunnels), but on a larger scale.
People rarely use these devices in private settings — they are mostly implemented in large corporate enterprises with many remote employees. Military or other organizations, where a secure remote connection is vital, also extensively use VPN concentrators.
Here are the primary functions of a VPN concentrator:
Using VPN concentrators helps companies ensure the same level of protection for all their employees.
You should consider using a VPN concentrator only if you operate a large business, as its maintenance costs are quite high. For a smaller number of users, a VPN router may be a sufficient protection measure, as it is much cheaper and easier to maintain. However, it is quite difficult to configure a VPN router for a larger number of connections, so a VPN concentrator is a more convenient option in such cases.
VPN concentrators should not be confused with site-to-site VPN services. The latter establish secure connections between fixed locations (for example, several offices), which then can access the same databases and internal systems.
Similarly to VPN services, there are lots of VPN concentrator manufacturers. Their price depends on how many VPN tunnels they can support and their workload capabilities. Here are some of the most popular brands:
To learn more about cybersecurity, subscribe to our monthly blog newsletter below!