Why competitors don’t secure your data
A Virtual Private Network (VPN) allows a remote computer to connect securely to a central network. The simplest example would be a worker connecting to the company network from home via the Internet. By using VPN encryption technology, the user can connect securely to the company network and send emails, access company servers, etc., without exposing private information to the public Internet where it could be intercepted. Once the encrypted VPN tunnel is established, the information that passes between the remote computer and the central network is effectively scrambled, and cannot be read or intercepted.
Unfortunately for WAN Optimization, the process of encrypting data for transfer through a VPN tunnel obscures details that are vital for optimization and acceleration – the type of file, its source, and the payload contents. The net result is that once data has been encrypted it cannot be accelerated. In order to both encrypt and accelerate, the acceleration must be done prior to encryption. Traditional WAN Optimization models rely on separate devices to perform these functions, increasing cost and implementation complexity. Acceleration Systems’ technology combines these two processes, providing a simple solution that accelerates encrypted data.