VPN Concentrator

A VPN concentrator is a server-side tool that helps manage numerous simultaneous remote VPN (virtual private network) connections. The device assigns IP addresses to authenticated users and utilizes cryptographic keys to encrypt/decrypt the transmitted data. As such, these VPN connections create end-to-end encryption for thousands of users, which makes it possible to securely access and transfer data on a large scale.

Because it’s an external device, the VPN concentrator can manage these connections without creating server bottlenecks. Many businesses use VPN concentrators so remote workers can connect to the company network privately from anywhere in the world. Prominent VPN concentrator manufacturers include Cisco, ShoreTel, and HPE.

VPN concentrator vs. VPN router

VPN concentrators are sometimes called VPN routers, and while they serve similar functions, they have entirely different use cases:

A VPN router is most commonly used in small businesses or private settings where very few VPN connections are required. These routers are available for under $100 and can be configured quickly and easily. Most standard wireless routers also support VPN configuration, although they usually only support a limited number of devices.

A VPN concentrator, on the other hand, can easily support 10,000 users at once. Concentrators can cost more than four times as much as a VPN router, which is why they are typically reserved for large corporations, government agencies, or similar organizations.


Related Links

Kaiti Norton
Kaiti Norton
Kaiti Norton is a Nashville-based Content Writer for TechnologyAdvice, a full-service B2B media company. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content. When she's not writing about technology, she's sharing her musings about fashion, cats, books, and skincare on her blog.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...

Crypt888 Ransomware

Crypt888, also known as Mircop, is ransomware that encrypts files on desktops, downloads,...

AutoLocky Ransomware

AutoLocky is ransomware written in the popular AutoIt scripting language. It uses strong...