VPN Concentrator

A VPN concentrator is a server-side tool that helps manage numerous simultaneous remote VPN (virtual private network) connections. The device assigns IP addresses to authenticated users and utilizes cryptographic keys to encrypt/decrypt the transmitted data. As such, these VPN connections create end-to-end encryption for thousands of users, which makes it possible to securely access and transfer data on a large scale.

Because it’s an external device, the VPN concentrator can manage these connections without creating server bottlenecks. Many businesses use VPN concentrators so remote workers can connect to the company network privately from anywhere in the world. Prominent VPN concentrator manufacturers include Cisco, ShoreTel, and HPE.

VPN concentrator vs. VPN router

VPN concentrators are sometimes called VPN routers, and while they serve similar functions, they have entirely different use cases:

A VPN router is most commonly used in small businesses or private settings where very few VPN connections are required. These routers are available for under $100 and can be configured quickly and easily. Most standard wireless routers also support VPN configuration, although they usually only support a limited number of devices.

A VPN concentrator, on the other hand, can easily support 10,000 users at once. Concentrators can cost more than four times as much as a VPN router, which is why they are typically reserved for large corporations, government agencies, or similar organizations.


Related Links

Kaiti Norton
Kaiti Norton
Kaiti Norton is a Nashville-based Content Writer for TechnologyAdvice, a full-service B2B media company. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content. When she's not writing about technology, she's sharing her musings about fashion, cats, books, and skincare on her blog.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...