VPN is on an unstoppable path towards obsolescence—between the physical infrastructure limitations and the serious vulnerabilities it poses in a cloud-centric world, evolution needs to happen for organizations’ perimeters to remain secure.
We’re a little biased, but DxOdyssey is a great solution for perimeter security in today’s world. So on a more granular level, what does the difference between DxOdyssey and a VPN actually look like?
Proprietary VPN router appliances are one of the mainstays in the long list of rigid physical requirements to sustain virtual private networks. DxOdyssey embodies an entirely new reality of flexibility. It can be run with any commodity OS/container running Windows or Linux, on any hardware, in any mix. The software-based approach gives organizations the flexibility to decide which platform to deploy on and avoids vendor lock-in.
Ease of Scalability
Scaling up a DxOdyssey environment is as easy as adding resources to the existing gateway, or just adding another gateway to scale out. VPN necessitates the cost-heavy, labor-intensive replacement of existing gear to scale up.
DxOdyssey Gateways can be easily scaled out for load balancing and HA, and if a gateway goes down, another in the group will automatically resume the connection. On the contrary, if a VPN goes down, the connection is lost until the hardware is updated or replaced.
Cost for Cloud Connection
DxOdyssey enables cloud connections for no additional cost, whereas a VPN requires paying a cloud vendor an hourly fee for the connection.
This category may be one of the most pertinent distinctions between DxOdyssey and VPN technology. DxO only enables access to specified applications resulting in little to no network attack surface. VPN gives its users access to the entire network, creating a very large network attack surface with open ports. Reducing these vulnerabilities and having no open ports allows for an optimally secure perimeter and fewer opportunities for attacks.
Configuration & Maintenance
DxOdyssey is extremely simple software to set up and maintain. All it requires is a quick installation and establishment of the connection, with no appliances to configure and maintain.
Virtual private networks involve a much longer list of configuration and maintenance—creating and managing firewall rules, managing access control lists, etc.
This overview just scratches the surface of the technical distinctions between DxOdyssey and VPN technology, but it provides plenty of insight into the main themes. It is not just a story about the increased security achieved by regulating access at the application level rather than the network level. DxO enables an entire framework of unparalleled flexibility—all with the insurance of built-in HA technology to keep connections intact through disasters and outages.