![[Translate to English:] [Translate to English:]](/fileadmin/_NCP/image/news/NCP_virtual_vpn_server.png)
[Translate to English:]
The virtual VPN gateway appliance is now available and can be installed on all popular virtualization platforms. Its broad feature base will benefit companies, service providers and SaaS providers. Mobile and stationary employees can be integrated into a cross-company network via the virtual VPN gateway. The VPN appliance is also well-suited for IIoT projects. Advanced features include sophisticated multi-client capability, VPN Path Finder Technology as well as simple update processes and high availability.
NCP's Virtual Secure Enterprise VPN Server is licensed on a subscription basis and consists of the VPN Server, High Availability Services and a hardened operating system. The VPN Server includes an easy-to-use graphical user interface for commissioning. Once this basic configuration has been completed, the Virtual Secure Enterprise VPN Server can be configured via a web browser – or soon via Secure Enterprise Management. Updates to the entire system can be easily installed at the touch of a button. A key advantage of the virtual appliance is that any security patches are provided exclusively by NCP and therefore the administrator does not need any special knowledge.
NCP's Virtual Secure Enterprise VPN Server is specifically designed to meet the needs of enterprises, service providers and SaaS providers looking for a virtualized and resource-efficient alternative to conventional solutions. The advanced multi-client capability of the NCP Virtual Secure Enterprise VPN Server enables the simultaneous use of a VPN gateway by several companies or group divisions (resource sharing). The NCP VPN clients can be managed by administrators for each company via a convenient access management system. Service providers benefit especially from simple scalability.
NCP Secure Enterprise VPN Server supports strong authentication features such as one-time-password-tokens (OTP), public key infrastructure (PKI) and certificates with elliptic curve cryptography. Certificates are validated against the Certification Authority (CA) based on revocation lists (online or offline) each time a connection is established.