{"id":9155,"date":"2017-03-07T11:48:01","date_gmt":"2017-03-07T11:48:01","guid":{"rendered":"https:\/\/sg.syspro.com\/blog\/vpn-tunnels-part-2-increasing-security-promoting-agility\/"},"modified":"2021-03-04T14:49:35","modified_gmt":"2021-03-04T14:49:35","slug":"vpn-tunnels-part-2-increasing-security-promoting-agility","status":"publish","type":"post","link":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/","title":{"rendered":"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility"},"content":{"rendered":"<p>As I mentioned in <a href=\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-increasing-security-promoting-agility\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part One<\/a> of this blog, a VPN tunnel allows for the safe transfer of data across the Internet, and adds layers of security to your company network. It does this through the use of <a href=\"http:\/\/www.webopedia.com\/TERM\/E\/encryption.html\">encryption<\/a> and other <a href=\"http:\/\/www.webopedia.com\/TERM\/S\/security.html\">security<\/a> mechanisms (including hardware settings\/passwords and approved IP addresses). <!--more-->These layers of security help to ensure that only <a href=\"http:\/\/www.webopedia.com\/TERM\/A\/authorization.html\">authorized<\/a> users can access the company network and that your data cannot be intercepted. I am not promoting a specific protocol hardware to use, but rather providing a rough outline of what is out there. I encourage you to find what suits best for your organization and environmental requirements.<\/p>\n<p>What you want to do is make your corporate network bullet proof from the outside and poke a tiny secure hole into your network using a VPN for users to connect to your systems.<\/p>\n<p><strong>VPN Network Protocols<\/strong><\/p>\n<p>At the heart of each VPN tunnel lies a communications protocol, known as a VPN Network Protocol. These protocols, equivalent to programming languages, are specific to communication devices; they form the rules that allow encapsulated \u201cpackets\u201d of information to be exchanged across the Internet between private networks. There are three main network protocols for use with VPN tunnels, although there are a few other special flavors that can be looked at. They are generally incompatible \u2013 that is to say, both ends of the VPN connection must be using the same protocol. The most commonly used protocols are:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.webopedia.com\/TERM\/P\/PPP.html\"><strong>PPTP<\/strong><\/a> &#8211; The Point-to-Point Tunneling Protocol is a technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.<\/li>\n<li><a href=\"http:\/\/www.webopedia.com\/TERM\/L\/L2TP.html\"><strong>L2TP<\/strong><\/a> &#8211; Layer Two (2) Tunneling Protocol is an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs).*<\/li>\n<li><a href=\"http:\/\/www.webopedia.com\/TERM\/I\/IPsec.html\"><strong>IPSec<\/strong><\/a> &#8211; developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement VPNs. IPsec supports two encryption modes: Transport and Tunnel.<\/li>\n<\/ul>\n<p><strong>Authentication and Encryption<\/strong><\/p>\n<p>Along with tunneling, authentication and encryption are the main components of a VPN. Authentication is a familiar three-phase process: identification, authentication and authorization. I, for example, identify myself to the destination network with my username: Al. Next I prove that I really am Al with a password\/pre-shared key\/certificate or smart card. This proves my authenticity \u2013 the destination network accepts me as a valid user. Now that I\u2019m authenticated, I receive access to the services that I\u2019m allowed to use. This is called authorization. Keep in mind that some ways of authenticating are more secure than others.<\/p>\n<p>Encryption is a key element of VPN, but the sophistication with which your VPN encrypts data is a matter of choice, and sometimes necessity. The issues revolve around security and speed. If your company\u2019s head office is in a \u201clast mile\u201d location, and the data it receives is forced to creep through last century\u2019s \u201ctwisted pair\u201d copper wires, only ever designed for an analogue phone, you might choose minimal encryption, especially if your data is not particularly sensitive. If, on the other hand, your data arrives at the speed of light through modern optical cable, and, furthermore, it\u2019s mission critical and highly sought after, you might be wise to choose an advanced encryption standard, such as AES 256.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Imagine your company with its new VPN. There\u2019s a central server with VPN hardware or software that supports all your remote locations, and a license for each user that covers basic SYSPRO ERP modules, SYSPRO e.net Solutions\u2122, and possibly other modules such as SYSPRO CRM. Now everyone in your far-flung organization, including the branch in Timbuktu, are on the same page. Customer issues, production problems, market conditions, etc., become apparent in real time. Analysis and decisions can be made more quickly than ever before.<\/p>\n<p>And the end result is? Agility and security are simultaneously improved. Congratulations \u2013 you\u2019ve helped turn your company into a lean, mean, profit-making machine, through the use of a VPN.<\/p>\n<p>*Bullets sourced from <a href=\"http:\/\/www.webopedia.com\/TERM\/V\/VPN.html\">http:\/\/www.webopedia.com\/TERM\/V\/VPN.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>As I mentioned in Part One of this blog, a VPN tunnel allows for the safe transfer of data across the Internet, and adds layers of security to your company network. It does this through the use of encryption and other security mechanisms (including hardware settings\/passwords and approved IP addresses).<\/p>\n","protected":false},"author":155,"featured_media":6824,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[269],"tags":[81],"class_list":["post-9155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-owning-or-running-erp","tag-maintaining-upgrading-erp"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility<\/title>\n<meta name=\"description\" content=\"With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility\" \/>\n<meta property=\"og:description\" content=\"With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-07T11:48:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T14:49:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Al Brough\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Al Brough\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\"},\"author\":{\"name\":\"Al Brough\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/#\/schema\/person\/3771285cf3f6e66c01ed7480ed015784\"},\"headline\":\"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility\",\"datePublished\":\"2017-03-07T11:48:01+00:00\",\"dateModified\":\"2021-03-04T14:49:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\"},\"wordCount\":687,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png\",\"keywords\":[\"Maintaining\/Upgrading ERP\"],\"articleSection\":[\"Managing-Operating ERP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\",\"url\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\",\"name\":\"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility\",\"isPartOf\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png\",\"datePublished\":\"2017-03-07T11:48:01+00:00\",\"dateModified\":\"2021-03-04T14:49:35+00:00\",\"description\":\"With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly\",\"breadcrumb\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage\",\"url\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png\",\"contentUrl\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png\",\"width\":900,\"height\":410,\"caption\":\"alistar_vpn_tunnels_increasing_security_promoting_agility_part2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sg.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/#website\",\"url\":\"https:\/\/sg.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sg.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/sg.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/sg.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/#\/schema\/person\/3771285cf3f6e66c01ed7480ed015784\",\"name\":\"Al Brough\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"url\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"contentUrl\":\"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"caption\":\"Al Brough\"},\"description\":\"Al Brough is an Analyst at SYSPRO Asia. Before entering the world of ERP, Al worked extensively in the sugar and timber manufacturing industry. With an undergraduate degree in Marketing and Human Resource Management, Al uses his broad knowledge base and pragmatic nature to find the perfect solution for every problem. His personal life is perfectly balanced by his lovely wife, an energetic Jack Russell, anything to do with trains and a slow-growing bonsai.\",\"url\":\"https:\/\/sg.syspro.com\/blog\/author\/al\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility","description":"With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/","og_locale":"en_US","og_type":"article","og_title":"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility","og_description":"With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly","og_url":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/","og_site_name":"SYSPRO Blog","article_published_time":"2017-03-07T11:48:01+00:00","article_modified_time":"2021-03-04T14:49:35+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png","type":"image\/png"}],"author":"Al Brough","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Al Brough","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#article","isPartOf":{"@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/"},"author":{"name":"Al Brough","@id":"https:\/\/sg.syspro.com\/blog\/#\/schema\/person\/3771285cf3f6e66c01ed7480ed015784"},"headline":"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility","datePublished":"2017-03-07T11:48:01+00:00","dateModified":"2021-03-04T14:49:35+00:00","mainEntityOfPage":{"@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/"},"wordCount":687,"commentCount":0,"publisher":{"@id":"https:\/\/sg.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage"},"thumbnailUrl":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png","keywords":["Maintaining\/Upgrading ERP"],"articleSection":["Managing-Operating ERP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/","url":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/","name":"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility","isPartOf":{"@id":"https:\/\/sg.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage"},"image":{"@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage"},"thumbnailUrl":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png","datePublished":"2017-03-07T11:48:01+00:00","dateModified":"2021-03-04T14:49:35+00:00","description":"With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly","breadcrumb":{"@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#primaryimage","url":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png","contentUrl":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistar_vpn_tunnels_increasing_security_promoting_agility_part2.png","width":900,"height":410,"caption":"alistar_vpn_tunnels_increasing_security_promoting_agility_part2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sg.syspro.com\/blog\/owning-or-running-erp\/vpn-tunnels-part-2-increasing-security-promoting-agility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sg.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility"}]},{"@type":"WebSite","@id":"https:\/\/sg.syspro.com\/blog\/#website","url":"https:\/\/sg.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/sg.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sg.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sg.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/sg.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sg.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/sg.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sg.syspro.com\/blog\/#\/schema\/person\/3771285cf3f6e66c01ed7480ed015784","name":"Al Brough","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","url":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","contentUrl":"https:\/\/sg.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","caption":"Al Brough"},"description":"Al Brough is an Analyst at SYSPRO Asia. Before entering the world of ERP, Al worked extensively in the sugar and timber manufacturing industry. With an undergraduate degree in Marketing and Human Resource Management, Al uses his broad knowledge base and pragmatic nature to find the perfect solution for every problem. His personal life is perfectly balanced by his lovely wife, an energetic Jack Russell, anything to do with trains and a slow-growing bonsai.","url":"https:\/\/sg.syspro.com\/blog\/author\/al\/"}]}},"metadata":{"_yoast_wpseo_focuskw":["VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility"],"_yoast_wpseo_focuskw_text_input":["VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility"],"_yoast_wpseo_title":["VPN Tunnels Part 2 \u2013 Increasing Security, Promoting Agility"],"_yoast_wpseo_metadesc":["With the correct VPN, customer issues, production problems, market conditions, etc., become apparent in real time, and analysis and decisions can be made more quickly"],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":[""],"_yoast_wpseo_linkdex":["78"],"_yoast_wpseo_metakeywords":[""],"_yoast_wpseo_is_cornerstone":[""],"_wp_page_template":["default"],"_thumbnail_id":["6824"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9155"}],"version-history":[{"count":0,"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9155\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/media\/6824"}],"wp:attachment":[{"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sg.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}