
Virtual private networks have been around for ages, since the early days of the internet nearly 30 years ago. They have been a reliable solution for many years, but unfortunately, the evolution of cloud-based data environments and increasingly-sophisticated cyber threats have outpaced this technology.
This article authored by our CEO, Don Boxley, talks about the strengths possessed by software-defined perimeter technology that enables it to pick up where VPNs left off and secure even the most complex, cross-platform data estates.
Read the full article here:
If you’re interested in learning more about DH2i’s approach to smart high availability technology, get signed up for a one-on-one demo today.

Josh Achtemeier
Most Recent Posts:
- Build a Test Lab for SQL Server 2025 on Kubernetes Using Minikube
- SQL Server 2025: Why High Availability and Disaster Recovery Are Essential for AI
- DxEnterprise for high availability now certified for RHEL 9.6
- DH2i Brings Mission-Critical HA Capability to the Table for SQL Server 2025-Backed AI Applications
- How to Tackle Back-to-School HA and Network Security with a Combined Software Approach
Subscribe to Our Blog
Subscribe for industry-leading information on all things tech.