{"id":7076,"date":"2020-06-25T10:08:37","date_gmt":"2020-06-25T15:08:37","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=7076"},"modified":"2020-07-21T14:52:30","modified_gmt":"2020-07-21T19:52:30","slug":"vpn-vs-remote-desktop-gateway-security-concerns","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/vpn-vs-remote-desktop-gateway-security-concerns\/","title":{"rendered":"VPN vs. Remote Desktop &#8211; Gateway Security Concerns"},"content":{"rendered":"<p>VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user \u2013 whether that\u2019s <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/02\/25\/bring-your-own-privacy\/\" rel=\"nofollow\" target=\"_blank\">from prying eyes<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> or the need to have physical access to their business network.<\/p>\n<p>\u00a0<\/p>\n<p>But while each option can be attractive, neither is without its <a href=\"https:\/\/www.poweradmin.com\/blog\/three-cybersecurity-trends-for-2019\/\">security concerns<\/a>. Before you make any decision on which you should use, it\u2019s important to understand the strengths of each as well as the weaknesses.<\/p>\n<h2><strong>What are VPNs?<\/strong><\/h2>\n<p>A VPN is a virtual private network that allows you to securely connect to another network across the internet. So, if for example you are working in a coffee shop and your connection is flagged as unsecured, a VPN would allow you to secure that connection through its virtual private network.<\/p>\n<p>\u00a0<\/p>\n<p>These networks use multiple layers of masking and encryption that make it extremely difficult for hackers, thieves, and even your own government to access your data as it is transmitted across the internet. For this reason, it is a popular choice for improving cybersecurity <a href=\"https:\/\/www.poweradmin.com\/blog\/protecting-your-privacy-in-windows-10\/\">and privacy<\/a>. VPNs have many <a href=\"https:\/\/www.freshbooks.com\/blog\/digital-security\" rel=\"nofollow\" target=\"_blank\">digital security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> uses, as this article will outline, but they are also not without their drawbacks and legal issues.<\/p>\n<h2><strong>What are the pros and cons of using a VPN?<\/strong><\/h2>\n<p>There are many benefits to using a VPN. The first, and perhaps most obvious, is that they keep you safe, secure, and hidden while you browse the internet. They are arguably the most secure, privacy-focused tool you can use to keep your activity away from prying eyes.<\/p>\n<p>\u00a0<\/p>\n<p>By using multiple layers of protection, VPN\u2019s camouflage the destination of your data packets as well as the origin so any third parties attempting to track you will have no idea what you searched for or where you went. Alongside this, the strongest VPNs typically use <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-256-bit-encryption\/\" rel=\"nofollow\" target=\"_blank\">256-bit encryption<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> \u2013 a level relied on by the largest financial institutions in the world.<\/p>\n<p>\u00a0<\/p>\n<p>VPNs are also compatible across multiple platforms and one provider will usually offer the service to many different devices and platforms, all from the same user account. You can use a VPN on your mobile phone, tablet, Macbook, Windows PC \u2013 just about anything you can imagine. Giving you a level of flexibility and coverage that very few tools can offer.<\/p>\n<p>\u00a0<\/p>\n<p>VPNs can be a great tool for <a href=\"https:\/\/www.cloudwards.net\/internet-censorship\/\" rel=\"nofollow\" target=\"_blank\">avoiding internet censorship<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> and\/or content that is location-specific. For example, some shows might be listed on Netflix USA that isn\u2019t listed on Netflix UK, or content from UK providers might not be available to people in New Zealand.<\/p>\n<p>\u00a0<\/p>\n<p>By using a VPN you can \u201cchange\u201d your location to be from the country required to access the content. Likewise, if you\u2019re in a country like China, and various websites are prohibited, you can use specific VPN services to circumvent the geo-restrictions and access whatever content you want.<\/p>\n<p>\u00a0<\/p>\n<p>Lastly, one of the best benefits of VPNs is that they\u2019re incredibly cheap for the service they offer. You can get access to all of the benefits listed above and much more, often for less than ten dollars per month. Many of them are free, although these are typically less secure.<\/p>\n<p>\u00a0<\/p>\n<p>Now while VPNs might come with several attractive benefits, they aren\u2019t without their drawbacks. One of the main drawbacks is that while a VPN is an effective security tool, it is not an all-in-one security solution.<\/p>\n<p>\u00a0<\/p>\n<p>It will hide your activity, but if you happen to download a file that is infected with malware, the VPN won\u2019t be able to help you. Unless coupled with strong cybersecurity practices and effective antivirus software, a VPN just won\u2019t be able to offer you the level of protection you may need.<\/p>\n<p>\u00a0<\/p>\n<p>VPNs are also illegal in some countries and using them can land you with expensive fines or even jail time. China and Russia are notable culprits that aggressively pursue anyone who violates VPN restrictions. It\u2019s also worth mentioning that while <a href=\"https:\/\/privacycanada.net\/best-vpn-netflix\/\" rel=\"nofollow\" target=\"_blank\">Netflix VPNs can access blocked Netflix content<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, they can\u2019t access <em>every<\/em> single piece of blocked content (ie, Disney+, Hulu, etc.) \u2013 so many users who have purchased the VPN for a specific reason may find themselves having to look elsewhere.<\/p>\n<h2><strong>What are RDGs?<\/strong><\/h2>\n<p>RDGs, or Remote Desktop Gateways are a tool that allows specific users to access a computer through the internet from any device that can run the RDG software. An easy way to think about it would be to think of how Netflix streams movies to your computer, or how GeForce Now allows you to access a high-spec gaming rig and play video games.<\/p>\n<p>\u00a0<\/p>\n<p>Similarly, an <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/remote\/remote-desktop-services\/clients\/remote-desktop-allow-access\" rel=\"nofollow\" target=\"_blank\">RDG allows you to securely access a computer<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> from just about anywhere in the world, from most devices you would use (like your laptop). Connections are usually secured behind HTTPS and the remote desktop protocol making them a preferred option for remote workers.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>What are the pros and cons of using RDGS?<\/strong><\/h2>\n<p>There are a few benefits to using RDGs that make them a great option for the right users. Firstly they\u2019re relatively inexpensive, with Microsoft\u2019s own remote desktop service being free. They\u2019re also securely connected through remote desktop protocols and <a href=\"https:\/\/toggl.com\/blog\/http-vs-https\" rel=\"nofollow\" target=\"_blank\">reliable HTTPS<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, which means you can enjoy a level of cybersecurity comfort as you work.<\/p>\n<p>\u00a0<\/p>\n<p>RDGs are also completely location independent. While your desktop itself might be at home or located in your office, you can technically access it from anywhere in the world, provided you have a suitable device, internet connection, and the right login details. This leaves you free to complete your work wherever you need to complete it \u2013 whether that\u2019s traveling or on the beach.<\/p>\n<p>\u00a0<\/p>\n<p>Another benefit is that your access device doesn\u2019t need to be <a href=\"https:\/\/www.poweradmin.com\/blog\/monitoring-remote-desktop-rdp-performance\/\">as high-spec<\/a> as the device that is running the desktop you\u2019re accessing, which can save money on technology costs. Also, if your desktop or access device is individually compromised they won\u2019t necessarily cross infect one another, which can cut down on replacement costs.<\/p>\n<p>\u00a0<\/p>\n<p>That said, an RDG does require a good connection to function to a desirable standard. Without, you may experience latency issues that will make it extraordinarily difficult to work. And it\u2019s worth mentioning that even more so than a VPN, an RDG is not strictly a security or privacy tool in and of itself, and won\u2019t provide you with anywhere near the full level of cybersecurity you need to make data breach worries a thing of the past.<\/p>\n<h2><strong>Conclusion <\/strong><\/h2>\n<p>VPNs and RDGs are both excellent tools. For accessing your desktop from a remote location, RDGs provide a secure option. But as far as general security and privacy essential goes, VPNs are a near-perfect option for anyone. While they aren\u2019t a complete security solution, they are a must-have if you are to protect your privacy and security in the modern world.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user \u2013 whether that\u2019s from prying eyes or the need to have physical access to their business network. \u00a0 But while each option can be [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":6948,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,42],"tags":[],"class_list":["post-7076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/7076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=7076"}],"version-history":[{"count":2,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/7076\/revisions"}],"predecessor-version":[{"id":7264,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/7076\/revisions\/7264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6948"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=7076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=7076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=7076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}