{"id":11281,"date":"2025-06-27T13:07:47","date_gmt":"2025-06-27T11:07:47","guid":{"rendered":"https:\/\/staging.netxconsult.de\/blog\/vpn-und-sichereres-awingu\/"},"modified":"2025-09-12T13:45:03","modified_gmt":"2025-09-12T11:45:03","slug":"unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/","title":{"rendered":"Insecure VPN &#8211; and why Awingu* (PSW) may be the better alternative"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.304%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.304%;--awb-width-medium:83.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:2.304%;--awb-spacing-left-medium:2.304%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:16px;\"><p><em>*Update October 2023: With the acquisition of Alludo, Awingu was renamed <strong>Parallels<\/strong><b>\u00ae<\/b> <strong>Secure Workspace<\/strong>. The described functions and advantages in security and flexibility remain unchanged. <\/em><em>With the new name, Awingu as Parallels Secure Workspace\u00ae is now a fully-fledged member of the Parallels family, alongside Parallels\u00ae Desktop, Parallels\u00ae RAS, Parallels\u00ae Toolbox and Parallels\u00ae Access.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><blockquote>\n<p style=\"text-align: left;\">Friends would not recommend a VPN to friends<\/p>\n<\/blockquote><\/h1><\/div><div class=\"fusion-text fusion-text-2\"><p>This quote is freely translated from a statement in a <a href=\"https:\/\/mattslifebytes.com\/2020\/02\/29\/remote-access-to-production-infrastructure-death-to-the-vpn\/\"><strong>blog post<\/strong><\/a> by Matthew Sullivan (original quote: Friends don&#8217;t let friends use VPNs). In this blog post here, we will discuss why traditional VPN (Virtual Private Network) solutions are no longer &#8220;good enough&#8221; for organizations to enable remote work and telecommuting. In the last third of the post, we will introduce Awingu&#8217;s solution &#8211; an alternative to the classic VPN approach.<\/p>\n<p>For the sake of clarity, when we talk about VPN, we are explicitly not talking about P2P-managed VPN connections for bridging two locations or commercial VPN services (which are assumed to provide a more private and secure browsing experience).<\/p>\n<p>VPN &#8211; Virtual Private Network &#8211; dates back to the 1990s. In 1996, Microsoft employee Gurdeep Singh-Pall &#8220;invented&#8221; the PPTP (Point-to-Point Tunneling Protocol). It offered a method for implementing virtual private networks and a secure Internet connection. In 1996, the world had 36 million Internet users (<a href=\"https:\/\/www.globalpolicy.org\/tables-and-charts-ql\/27519-internet-users.html\"><strong>source<\/strong><\/a>). Two thirds of them were based in the USA. There were an astonishing 100,000 websites, Netscape was the browser of choice, and at 33.8 Kbps, users could surf the Internet at the speed of light. VPN was the tool of choice at the time. Of course, times have changed.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h2>The typical security problems with corporate VPNs<\/h2><\/h1><\/div><div class=\"fusion-text fusion-text-3\"><p>Your Content Goes Here<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">Once you&#8217;re in, you&#8217;re really &#8220;in&#8221;<\/h3>\n<p>According to an <strong>IDC analysis <\/strong>, more than 40% of security breaches come from authorized users, such as contractors, vendors and employees. The problem? VPNs don&#8217;t usually offer granular controls. But they are necessary for assigning users with specific rights. Once a remote user is authenticated by a VPN, that user is considered trusted and is granted access to everything on the corporate network. This makes the corporate network and its resources quite vulnerable and open to attacks or data leaks.<\/p>\n<p>VPN user access management is not only linked to the Active Directory (AD), but also to the device certificates. This means that when an employee leaves the company, their device certificate must be revoked &#8211; and like all manual tasks, this is unfortunately often forgotten.<\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">The need to always use the latest version<\/h3>\n<p>VPN platforms are popular. Also with hackers. No platform can benefit from absolute security, and this is certainly true for VPN providers. In the past year alone, many of the most popular and widely used VPN platforms have been breached at their core &#8211; at the endpoint. In some cases, it took weeks for the manufacturers to provide a security patch that closed the gap. Below is just a small list of the most recent vulnerabilities:<\/p>\n<ul>\n<li><strong>Palo Alto:<\/strong> <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2021-3051\">CVE-2021-3051 Cortex XSOAR<\/a>: Authentication Bypass in SAML Authentication in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-3051\">CVE-2021-3051<\/a><\/li>\n<li><strong>FortiGuard: <\/strong><a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-077\">FortiPortal &#8211; Authentication bypass and remote code execution as root<\/a> in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32588\">CVE-2021-32588<\/a><\/li>\n<li><strong>Pulse Secure: <\/strong><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44784\/?kA23Z000000boUWSAY\">SA44784 &#8211; 2021-04<\/a>: Multiple Vulnerabilities Resolved in Pulse Connect Secure 9.1R11.4 related to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22893\">CVE-2021-22893<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22894\">CVE-2021-22894<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22899\">CVE-2021-22899<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22900\">CVE-2021-22900<\/a><\/li>\n<li><strong>Citrix: <\/strong><a href=\"https:\/\/support.citrix.com\/article\/CTX307794\">CTX307794<\/a> related to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22907\">CVE-2021-22907<\/a><\/li>\n<\/ul>\n<p>The message is clear. Especially when you consider that it&#8217;s easy to tell which VPN technology is being used by whom: always run the latest version, always apply all security patches, and do so immediately. By the way, this should be standard practice for any software solution these days.<\/p>\n<\/div><div class=\"fusion-text fusion-text-6\"><h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">Login (only) with password<\/h3>\n<p>Multi-factor authentication is the absolute minimum that users should use for authentication with VPN. Unfortunately, it is still not standard in many organizations (!) It&#8217;s like leaving the door to your own house wide open. Many user passwords have already been hacked and are collected in databases on the dark web (easy to find even for laymen). What&#8217;s more, by simply using &#8220;123456&#8221; as a password, hackers already have an amazing chance of getting in. By the way: According to NordPass, the most common passwords in 2020 were the following:<\/p>\n<ul>\n<li><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">123456<\/span><\/li>\n<li><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">123456789<\/span><\/li>\n<li>12345678<\/li>\n<li>password<\/li>\n<li>1234567<\/li>\n<li>123123<\/li>\n<li>1234567890<\/li>\n<li>111111<\/li>\n<li>abc123<\/li>\n<li>00000<\/li>\n<\/ul>\n<p>Another delicacy for all those who live in the German Ruhr area: &#8220;schalke&#8221; makes it to 95th place. Unfortunately, the passwords are no longer at Bundesliga level, but at least they are in the top 100 <img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/svg\/1f609.svg\" alt=\"????\" \/><\/p>\n<p>No wonder a Microsoft study found that using MFA blocks account takeover attacks 99.9% of the time.<\/p>\n<p><b>Conclusion: Use MFA. Always. This is an absolute minimum. <\/b><\/p>\n<\/div><div class=\"fusion-text fusion-text-7\"><h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">Compromised devices<\/h3>\n<p>End users must activate the VPN connection via a VPN client on their <a href=\"https:\/\/netxconsult.de\/en\/blog\/endpoint-analytics-ungeplante-leerlaufzeiten-mindern\/\">device<\/a> &#8211; usually a laptop. Once the connection between the device and the corporate network is established, the gates to Valhalla are usually open. Even if this authentication is done with additional security such as MFA. This means that if the device on which the VPN client is running is infected with malware, opening a VPN connection can also lead to the malware finding its way into your company network. In other words, anything you can do on the device, the attacker can do too. Every resource in the company network that you can reach via the VPN can also be reached by the attacker.<\/p>\n<p>That&#8217;s why you only want to enable VPN on devices that are owned and managed by the company. The IT department must have optimal control over the device and be sure that it is running the latest operating system version and patches, has an active anti-malware service, can be reset remotely in case of doubt, etc. For precisely these reasons, VPN should only be permitted on devices that are privately owned by employees in absolutely exceptional cases for security reasons.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">Flexibility and UX of VPN<\/h3>\n<p>You can use VPN to extend your company network to another device that is located in a private home network, for example. The device basically behaves as if it were running in the LAN. This has several consequences:<\/p>\n<p>Users can generally use all local software and files that run on the device itself.<\/p>\n<p>When assets are accessed on the corporate network, they are fully downloaded (or uploaded); for example, if work is being done on a database file on a shared drive, the file is constantly being downloaded and uploaded<\/p>\n<p>By using split tunneling, traffic (such as YouTube and social media) can be routed via the public internet access instead of the VPN. However, this obviously comes with other security risks. The alternative is to route all traffic through the corporate VPN, which can be a drain on VPN capacity.<\/p>\n<p><b>Conclusion: VPN offers users (if they have a managed laptop) their familiar office experience. However, this comes at the expense of capacity. <\/b><\/p>\n<\/div><div class=\"fusion-text fusion-text-9\"><h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Each <a href=\"https:\/\/netxconsult.de\/en\/blog\/endpoint-analytics-ungeplante-leerlaufzeiten-mindern\/\">device<\/a><\/h4>\n<p>For security reasons, it is therefore advisable to only activate VPN on devices that you fully manage. However, most corporate VPN clients are not available on all devices and operating systems (e.g. MacOS devices, Chromebooks, Raspberry Pi, Android tablets, &#8230;). This limits your degree of freedom and that of your users.<\/p>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Capacity<\/h4>\n<p>As described above, VPN platforms usually need to absorb a large download and upload capacity. These platforms are rarely scaled to allow 100% of users to work remotely at the same time. As a result, capacity and associated performance issues are a common challenge.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-double sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:rgba(0,0,0,0);border-color:rgba(0,0,0,0);border-top-width:25px;border-bottom-width:25px;\"><\/div><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h2>At <a href=\"http:\/\/awingu.com\/de\">Awingu<\/a>, we do things differently<\/h2><\/h1><\/div><div class=\"fusion-text fusion-text-10\"><p>Awingu is a browser-based unified workspace. It provides RDP-based applications and desktops in HTML5 on any browser. It also aggregates file servers, intranets, web applications, SaaS, &#8230; together behind a single pane of glass with single sign-on. Take a look at the <a href=\"https:\/\/www.awingu.com\/architecture\/\"><strong>architecture<\/strong><\/a> and the <a href=\"https:\/\/www.awingu.com\/solution\/awingu-features\/\"><strong>functions<\/strong><\/a> from Awingu to find out more.<\/p>\n<\/div><div class=\"fusion-text fusion-text-11\"><h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">The basic safety layers are already installed<\/h3>\n<p><img decoding=\"async\" class=\"wp-image-5919 alignleft\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-200x260.png\" alt=\"Zero Trust Security\" width=\"110\" height=\"143\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-200x260.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-231x300.png 231w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-300x389.png 300w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-400x519.png 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-600x779.png 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-768x996.png 768w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-789x1024.png 789w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-800x1038.png 800w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu-1184x1536.png 1184w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/ZeroTrusGradeSecurity-Awingu.png 1200w\" sizes=\"(max-width: 110px) 100vw, 110px\" \/>Awingu provides its users with a minimum level of <a href=\"https:\/\/netxconsult.de\/en\/it-security-2\/\">IT security<\/a> for its users. It is generally used in conjunction with an RDS (terminal server) and RDP access. The following list is intended to provide an overview of the security levels that Awingu enables in addition to the usual RDP\/RDS scenario.<\/p>\n<\/div><div class=\"fusion-text fusion-text-12\"><ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Multi-factor authentication<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Awingu comes with an integrated MFA solution and can easily integrate your current authentication method (if required). By adding MFA, you minimize the risk of brute force attacks. The MFA integrated in Awingu supports the use of one-time tokens (HOTP) and time-based tokens (TOTP). Awingu also integrates DUO Security, Azure MFA, SMS passcode or Radius-based services.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\"><strong>Encryption via HTTPS<\/strong><\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Between the end user (browser) and the Awingu virtual appliance, Awingu favors and enables encryption via HTTPS. It also allows the use of own SSL certificates (or SSL proxy). In addition, Awingu has a built-in integration with Let&#8217;s Encrypt, which automatically generates a unique SSL certificate and takes care of its renewal.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Port 443 only<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>When set up correctly, Awingu only requires port 443 to be available to end-user clients.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Comprehensive usage control<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Awingu comes with an extensive usage log. The usage audit tracks which application sessions users open (or close) and when and where (from which IP address) they do so. It also tracks which files are opened, deleted, shared, etc. The audit log is available via the Awingu dashboard (Admin) and custom reports can be extracted.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Detection of anomalies<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Find out about irregularities in your environment, such as someone logging in too often with an incorrect password or someone trying to log in from abroad. This information is available via the Awingu dashboard (Admin only).<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">RDP via HTML<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>RDP is known to have numerous exploits. Especially when running older and unpatched versions. HTML minimizes the &#8220;threat vector&#8221; specific to RDP (e.g. Bluekeep, NotPetya).<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Granular usage controls<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Specific rights can be assigned for each user (group); e.g. preventing the use of the virtual printer (i.e. no printing at home), preventing the downloading (or uploading) of files to and from the local desktop, preventing the sharing of Awingu application sessions, preventing the sharing of Awingu files, etc.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">Recording of the session<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Awingu can activate the automatic recording of certain applications or users (note: excluded for Awingu reverse proxy sessions). The end user receives a message about the recording before starting their Awingu application\/desktop and must &#8220;accept&#8221; it.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 26; line-height: 1.4;\" data-fontsize=\"26\" data-lineheight=\"36.4px\">No local data<\/h4>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>All applications, files, hosted desktops etc. run in the browser in HTML5. There is no footprint on the device (cf. granular usage controls). Only screen content is transferred.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:rgba(0,0,0,0);border-color:rgba(0,0,0,0);border-top-width:25px;\"><\/div><\/div><div class=\"fusion-text fusion-text-13\"><h3>Awingu &#8211; unbeatable user experience<\/h3>\n<p>With Awingu, users can take any device, including their own personal device, and get their work done. It can be a Windows 7 device, a MacBook or a tablet. Awingu enables modern remote working &#8211; simply and securely.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"9205\" height=\"5000\" alt=\"Devices with Awingu\" title=\"awingu-devices\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices.png\" class=\"img-responsive wp-image-5918\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices-200x109.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices-400x217.png 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices-600x326.png 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices-800x435.png 800w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices-1200x652.png 1200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2021\/09\/awingu-devices.png 9205w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-14\"><p>Can be used on any device with an HTML5 browser<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=ujz0n6c4sK0&amp;t=1s\">(1) Awingu in 1 minute (German) &#8211; YouTube<\/a><\/p>\n<p>Feel free to contact us. As a Certified Awingu Partner, we offer you the opportunity to test Awingu in your own infrastructure for several weeks with our attractive proof-of-concept package. You then decide whether the solution makes sense for you.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-max-width:400px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"400\" height=\"200\" alt=\"Awingu Certified GOLD Partner\" title=\"Awingu Certified Gold Partner\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/Awingu-Certified-Gold-Partner.png\" class=\"img-responsive wp-image-7095\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/Awingu-Certified-Gold-Partner-200x100.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/Awingu-Certified-Gold-Partner.png 400w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-double sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:rgba(0,0,0,0);border-color:rgba(0,0,0,0);border-top-width:50px;border-bottom-width:50px;\"><\/div><\/div><div class=\"fusion-text fusion-text-15\"><p><em>This blog article is a slight adaptation of the blog post by Arnaud Marliere, Chief Marketing Officer at Awingu (<\/em><a href=\"https:\/\/www.awingu.com\/friends-dont-let-friends-use-vpn\/\"><em>to the original<\/em><\/a><em>).<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":7093,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[337],"tags":[293,294,292],"class_list":["post-11281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en_offers","tag-awingu-en","tag-virtual-personal-network-en","tag-vpn-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VPN Insecure? Why Awingu* (PSW) Could Be the Safer Alternative<\/title>\n<meta name=\"description\" content=\"Traditional VPNs are reaching their limits. Learn why they are insecure for remote work and how Awingu* provides a safer, modern alternative.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VPN Insecure? Why Awingu* (PSW) Could Be the Safer Alternative\" \/>\n<meta property=\"og:description\" content=\"Traditional VPNs are reaching their limits. Learn why they are insecure for remote work and how Awingu* provides a safer, modern alternative.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-27T11:07:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-12T11:45:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/dontusevpn.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vanessa Daugherty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vanessa Daugherty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/\"},\"author\":{\"name\":\"Vanessa Daugherty\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/53ca4ac6a6b996e04dc20a85d7a19249\"},\"headline\":\"Insecure VPN &#8211; and why Awingu* (PSW) may be the better alternative\",\"datePublished\":\"2025-06-27T11:07:47+00:00\",\"dateModified\":\"2025-09-12T11:45:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/\"},\"wordCount\":2901,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/dontusevpn.jpg\",\"keywords\":[\"Awingu\",\"Virtual Personal Network\",\"VPN\"],\"articleSection\":[\"EN_offers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/\",\"name\":\"VPN Insecure? Why Awingu* (PSW) Could Be the Safer Alternative\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/dontusevpn.jpg\",\"datePublished\":\"2025-06-27T11:07:47+00:00\",\"dateModified\":\"2025-09-12T11:45:03+00:00\",\"description\":\"Traditional VPNs are reaching their limits. Learn why they are insecure for remote work and how Awingu* provides a safer, modern alternative.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/dontusevpn.jpg\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/dontusevpn.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"no. forbidden. don't do it. serious frowning man hand gesture. portrait of a young guy on light background. emotion facial expression. feelings and people reaction.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insecure VPN &#8211; and why Awingu* (PSW) may be the better alternative\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/53ca4ac6a6b996e04dc20a85d7a19249\",\"name\":\"Vanessa Daugherty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"caption\":\"Vanessa Daugherty\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/vanessanetx\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VPN Insecure? Why Awingu* (PSW) Could Be the Safer Alternative","description":"Traditional VPNs are reaching their limits. Learn why they are insecure for remote work and how Awingu* provides a safer, modern alternative.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/","og_locale":"en_US","og_type":"article","og_title":"VPN Insecure? Why Awingu* (PSW) Could Be the Safer Alternative","og_description":"Traditional VPNs are reaching their limits. Learn why they are insecure for remote work and how Awingu* provides a safer, modern alternative.","og_url":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/","og_site_name":"netX consult","article_published_time":"2025-06-27T11:07:47+00:00","article_modified_time":"2025-09-12T11:45:03+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/dontusevpn.jpg","type":"image\/jpeg"}],"author":"Vanessa Daugherty","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vanessa Daugherty","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/"},"author":{"name":"Vanessa Daugherty","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/53ca4ac6a6b996e04dc20a85d7a19249"},"headline":"Insecure VPN &#8211; and why Awingu* (PSW) may be the better alternative","datePublished":"2025-06-27T11:07:47+00:00","dateModified":"2025-09-12T11:45:03+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/"},"wordCount":2901,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/dontusevpn.jpg","keywords":["Awingu","Virtual Personal Network","VPN"],"articleSection":["EN_offers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/","url":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/","name":"VPN Insecure? Why Awingu* (PSW) Could Be the Safer Alternative","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/dontusevpn.jpg","datePublished":"2025-06-27T11:07:47+00:00","dateModified":"2025-09-12T11:45:03+00:00","description":"Traditional VPNs are reaching their limits. Learn why they are insecure for remote work and how Awingu* provides a safer, modern alternative.","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/dontusevpn.jpg","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/04\/dontusevpn.jpg","width":2000,"height":1333,"caption":"no. forbidden. don't do it. serious frowning man hand gesture. portrait of a young guy on light background. emotion facial expression. feelings and people reaction."},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/unsafe-vpn-and-why-awingu-psw-can-be-the-better-alternative\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"Insecure VPN &#8211; and why Awingu* (PSW) may be the better alternative"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/53ca4ac6a6b996e04dc20a85d7a19249","name":"Vanessa Daugherty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","caption":"Vanessa Daugherty"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/vanessanetx\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/11281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=11281"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/11281\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media\/7093"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=11281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=11281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=11281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}