SlideShare a Scribd company logo
1 of 11
Download to read offline
WHO IS
ACCESS
SERVER
FOR?
OpenVPN Access Server
was created for
sized businesses,
but also has the capacity to
small-to-medium
scale into the
THOUSANDS.
However, there are a few common personas
that we commonly see deploy and use
OpenVPN Access Server, and those personas
can be narrowed down to three overarching types.
Which do you identify with?
1. The Administrator
A SYSTEM ADMINISTRATOR is the person
responsible for the maintenance, configuration,
and reliable operation of computer systems.
Administrators are responsible for installing
new systems, and assessing and implementing
upgrades as needed.
They conduct consistent
analyses of a company’s
computer systems to
determine if existing
components meet the
company’s needs and
perform upgrades
or updates as needed.
2. Small-to-Medium
Sized Business Owners
From arranging financing to
hiring and managing staff, to
creating marketing strategies
and identifying business
opportunities, these men
and women are doing it all.
These BUSINESS
OWNERS operate
their own companies
and handle a wide range
of responsibilities —
a lot of the time they end
up being a one-person
show wearing a lot of
different hats.
3. Chief Information
Security Officer (CISO)
Chief Information Security Officer
(CISO) is a relatively new c-suite
position for medium to large size
organizations — this particular
executive is responsible for the
organization’s information and
data security.
The CISO oversees the broad scope of
IT operations and makes the final
decision as to which systems to use.
Regardless of who you are or your
organizational role, the size of your business,
or your security needs, Access Server
was designed to work for you.
Whether you have servers in your office,
a datacenter, or a cloud-based system
that contains the programs and files that
you need to work with at home or on
the road, the OpenVPN Access Server
can be used for secure access.
OpenVPN offers a cost-effective
alternative to other VPN technologies —
making it a leading cybersecurity
solution for any enterprise.
Connecting Your World Securely

More Related Content

Similar to Who is OpenVPN Access Server for?

Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSecurestorm
 
Mb0047 management information system winter 2014
Mb0047  management information system winter 2014Mb0047  management information system winter 2014
Mb0047 management information system winter 2014Mba Assignments
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESIJNSA Journal
 
The Interim CIO
The Interim CIOThe Interim CIO
The Interim CIObreid8074
 
The Interim CIO
The Interim CIOThe Interim CIO
The Interim CIObreid8074
 
Cpdone Product Demo Screens and Demo Video
Cpdone Product Demo Screens and Demo VideoCpdone Product Demo Screens and Demo Video
Cpdone Product Demo Screens and Demo Videoxtcmc102
 
Serverless, the threeways
Serverless, the threewaysServerless, the threeways
Serverless, the threewaysJonathan Vines
 
LeSS is Scrum - Naveen S @ CMBAgileCon 2016
LeSS is Scrum - Naveen S @ CMBAgileCon 2016LeSS is Scrum - Naveen S @ CMBAgileCon 2016
LeSS is Scrum - Naveen S @ CMBAgileCon 2016ColomboCampsCommunity
 
Michael C. Rimkus Resume
Michael C. Rimkus ResumeMichael C. Rimkus Resume
Michael C. Rimkus ResumeMichael Rimkus
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?LinuxIT
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Management information system with relevance to Nepal
Management information system with relevance to NepalManagement information system with relevance to Nepal
Management information system with relevance to NepalDarshan Bhattarai
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Waves2 Overview
Waves2 OverviewWaves2 Overview
Waves2 Overviewsobrien15
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Where Are You in Managing Big System Implementation?
Where Are You in Managing Big System Implementation?Where Are You in Managing Big System Implementation?
Where Are You in Managing Big System Implementation?Endeavor Management
 

Similar to Who is OpenVPN Access Server for? (20)

Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
Mb0047 management information system winter 2014
Mb0047  management information system winter 2014Mb0047  management information system winter 2014
Mb0047 management information system winter 2014
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
The Interim CIO
The Interim CIOThe Interim CIO
The Interim CIO
 
The Interim CIO
The Interim CIOThe Interim CIO
The Interim CIO
 
Cpdone Product Demo Screens and Demo Video
Cpdone Product Demo Screens and Demo VideoCpdone Product Demo Screens and Demo Video
Cpdone Product Demo Screens and Demo Video
 
Serverless, the threeways
Serverless, the threewaysServerless, the threeways
Serverless, the threeways
 
LeSS is Scrum - Naveen S @ CMBAgileCon 2016
LeSS is Scrum - Naveen S @ CMBAgileCon 2016LeSS is Scrum - Naveen S @ CMBAgileCon 2016
LeSS is Scrum - Naveen S @ CMBAgileCon 2016
 
Michael C. Rimkus Resume
Michael C. Rimkus ResumeMichael C. Rimkus Resume
Michael C. Rimkus Resume
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?What Is an MSP and How Do I Choose One?
What Is an MSP and How Do I Choose One?
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Acme
AcmeAcme
Acme
 
Management information system with relevance to Nepal
Management information system with relevance to NepalManagement information system with relevance to Nepal
Management information system with relevance to Nepal
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Waves2 Overview
Waves2 OverviewWaves2 Overview
Waves2 Overview
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Esop Guardian Presentation
Esop Guardian PresentationEsop Guardian Presentation
Esop Guardian Presentation
 
Where Are You in Managing Big System Implementation?
Where Are You in Managing Big System Implementation?Where Are You in Managing Big System Implementation?
Where Are You in Managing Big System Implementation?
 

More from francisdinha

Safeguard Your Customer's Financial Data By Providing Secure Payment Systems
Safeguard Your Customer's Financial Data By Providing Secure Payment SystemsSafeguard Your Customer's Financial Data By Providing Secure Payment Systems
Safeguard Your Customer's Financial Data By Providing Secure Payment Systemsfrancisdinha
 
Third Party Access Control
Third Party Access ControlThird Party Access Control
Third Party Access Controlfrancisdinha
 
Remote Access VPN: Give Your Employees the Access They Need
Remote Access VPN: Give Your Employees the Access They NeedRemote Access VPN: Give Your Employees the Access They Need
Remote Access VPN: Give Your Employees the Access They Needfrancisdinha
 
Learn How to Create a Secure IoT Private Network
Learn How to Create a Secure IoT Private NetworkLearn How to Create a Secure IoT Private Network
Learn How to Create a Secure IoT Private Networkfrancisdinha
 
Enterprise VPN: What you need to know
Enterprise VPN: What you need to knowEnterprise VPN: What you need to know
Enterprise VPN: What you need to knowfrancisdinha
 
Cybersecuity Tips for Small Businesses
Cybersecuity Tips for Small BusinessesCybersecuity Tips for Small Businesses
Cybersecuity Tips for Small Businessesfrancisdinha
 
Securing Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based SystemsSecuring Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based Systemsfrancisdinha
 

More from francisdinha (8)

Safeguard Your Customer's Financial Data By Providing Secure Payment Systems
Safeguard Your Customer's Financial Data By Providing Secure Payment SystemsSafeguard Your Customer's Financial Data By Providing Secure Payment Systems
Safeguard Your Customer's Financial Data By Providing Secure Payment Systems
 
Third Party Access Control
Third Party Access ControlThird Party Access Control
Third Party Access Control
 
Remote Access VPN: Give Your Employees the Access They Need
Remote Access VPN: Give Your Employees the Access They NeedRemote Access VPN: Give Your Employees the Access They Need
Remote Access VPN: Give Your Employees the Access They Need
 
Learn How to Create a Secure IoT Private Network
Learn How to Create a Secure IoT Private NetworkLearn How to Create a Secure IoT Private Network
Learn How to Create a Secure IoT Private Network
 
Enterprise VPN: What you need to know
Enterprise VPN: What you need to knowEnterprise VPN: What you need to know
Enterprise VPN: What you need to know
 
Cybersecuity Tips for Small Businesses
Cybersecuity Tips for Small BusinessesCybersecuity Tips for Small Businesses
Cybersecuity Tips for Small Businesses
 
Securing Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based SystemsSecuring Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based Systems
 
OpenVPN
OpenVPNOpenVPN
OpenVPN
 

Recently uploaded

WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 

Recently uploaded (20)

WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 

Who is OpenVPN Access Server for?

  • 2. OpenVPN Access Server was created for sized businesses, but also has the capacity to small-to-medium scale into the THOUSANDS.
  • 3. However, there are a few common personas that we commonly see deploy and use OpenVPN Access Server, and those personas can be narrowed down to three overarching types. Which do you identify with?
  • 5. A SYSTEM ADMINISTRATOR is the person responsible for the maintenance, configuration, and reliable operation of computer systems. Administrators are responsible for installing new systems, and assessing and implementing upgrades as needed. They conduct consistent analyses of a company’s computer systems to determine if existing components meet the company’s needs and perform upgrades or updates as needed.
  • 7. From arranging financing to hiring and managing staff, to creating marketing strategies and identifying business opportunities, these men and women are doing it all. These BUSINESS OWNERS operate their own companies and handle a wide range of responsibilities — a lot of the time they end up being a one-person show wearing a lot of different hats.
  • 9. Chief Information Security Officer (CISO) is a relatively new c-suite position for medium to large size organizations — this particular executive is responsible for the organization’s information and data security. The CISO oversees the broad scope of IT operations and makes the final decision as to which systems to use.
  • 10. Regardless of who you are or your organizational role, the size of your business, or your security needs, Access Server was designed to work for you. Whether you have servers in your office, a datacenter, or a cloud-based system that contains the programs and files that you need to work with at home or on the road, the OpenVPN Access Server can be used for secure access. OpenVPN offers a cost-effective alternative to other VPN technologies — making it a leading cybersecurity solution for any enterprise.