1. establishing a connection
Your device establishes a connection to a VPN server via an app or software. This connection is encrypted from the start.
The digital world is more connected than ever before - but it is precisely this openness that makes companies vulnerable to attack. Those who protect their communication on the Internet, secure data and properly regulate access controls secure their digital sovereignty in the long term. Virtual private networks, or VPNs for short, play a central role in this. They create encrypted connections between devices, locations or data centers - and ensure a protected tunnel for data traffic.
STACKIT, the Schwarz Group's European cloud platform, also offers a sovereign, data protection-compliant approach to VPN infrastructure. Whether as a supplement to the private networking solution in the cloud or for secure coupling of hybrid networks: STACKIT allows connections to be designed flexibly, securely and efficiently - GDPR-compliant, ISO-certified and operated in data centers in Germany and Austria.
Modern IT infrastructures are rarely limited to one location. Companies work in a network - across locations, clouds, services and devices. VPNs enable secure, encrypted communication over the Internet - and reliably protect sensitive data from unauthorized access.
STACKIT offers you a reliable platform for your VPN requirements - operated on European servers, with a focus on security, data protection and integration into existing networks. This makes setting up encrypted, internal connections as simple as it is controllable - whether between data centers, remote users or for secure access to an internal service, external websites or a specific site.
You benefit from:
A VPN (Virtual Private Network) is a technology for secure data transmission via public or insecure networks - especially the internet. All data traffic between an end device (e.g. laptop, smartphone or server) and the target system is routed through a so-called tunnel. Technically speaking, this tunnel is an encrypted connection that prevents third parties - for example in open WLANs, public hotspots or within external networks - from viewing, reading or manipulating the transmitted content.
A VPN fulfills several functions at the same time: it protects the confidentiality of the data, ensures the integrity of the connection and guarantees a certain degree of anonymity by replacing the user's real IP address with that of the VPN server. This means that neither the location nor the content of the connection is visible to outsiders. This allows you to retain control even when using a public site, sensitive websites or an external service.
In professional environments, a VPN also enables protected access to internal systems, such as company networks, cloud environments or virtual machines. By using protocols such as IPsec or OpenVPN, a high standard of security is achieved - regardless of the end device or operating system used.
An example: A sales team works remotely from different locations. Access to the central CRM system on the company's intranet is secured via a VPN. All connections are encrypted, regardless of the device used or the local WLAN connection.
Your device establishes a connection to a VPN server via an app or software. This connection is encrypted from the start.
The VPN service replaces your real IP address with that of the VPN server. For a website or other services, it appears as if all requests are coming from this location. This protects your privacy.
All data that you send or receive is routed through this tunnel - shielded from the outside, encrypted according to modern standards, for example via the OpenVPN or IPsec protocol.
STACKIT focuses on the combination of flexibility and security. VPN operation does not take place as an isolated service, but is part of a closed, private network within the STACKIT Cloud.
In concrete terms, this means
This architecture protects not only the data, but also the communication and the systems themselves - regardless of whether they are used by internal employees, external partners or machines.
A VPN can make your network communication considerably more secure - provided it is set up carefully. Below you will find practical recommendations for successful VPN operation with STACKIT:
Secure VPN access: Use strong authentication mechanisms - such as certificates or two-factor authentication. This provides additional protection for your connection.
Update the VPN server regularly: Whether OpenVPN or IPsec - always keep your software up to date to avoid known security vulnerabilities.
Use network segmentation: Limit access rights for individual devices, users or services. This prevents individual attack vectors from jeopardizing the entire network.
Enable monitoring & logging: Keep an eye on important metrics such as connection duration, data traffic or suspicious activities - for example via STACKIT Monitoring.
Design mobile use consciously: Make sure that Android and Apple apps also use the VPN tunnel correctly. Many VPN clients offer an always-on mode - for continuous protection, even when switching networks.
In many companies, users work across different locations - in different European countries, for example. A VPN makes it possible to connect individual locations with each other in a controlled manner and to manage access rights centrally. At the same time, it is possible to ensure that sensitive data is only transmitted via internal channels - even during mobile surfing.
Employees access central applications via VPN app - regardless of browser or device. The connection remains protected, even in private WLAN environments.
Existing on-premises systems are connected to STACKIT resources via VPN - for example for exchanging data, synchronizing services or securing external APIs.
Machines, sensors or IoT devices receive controlled access to the central infrastructure via VPN - protected by protocol filters and dedicated VPN gateways.
For teams evaluating content on platforms such as Google or testing streaming services, secure connection via VPN access is essential. Dedicated VPN connections can be used to control access to any website - regardless of whether it is a streaming portal, Google services or your own website. In this way, you can also secure your best user experience across different sites and protect the services you use in the long term.
A VPN is much more than just a digital cloak. It is a crucial building block for security, data protection and digital control. With its sovereign cloud services, STACKIT creates the basis for stable, encrypted connections - operated in the EU, secured to the highest standards, flexible to use on Android, iOS, Windows, Linux and beyond.
Whether you want to work across multiple locations, transport sensitive information or protect your systems against data leaks - with VPN and STACKIT, you can create a trustworthy environment for your digital business processes.
A VPN is a virtual tunnel on the Internet that encrypts your data and protects it from unauthorized access. It masks your IP address, protects your privacy and enables secure access to remote networks.
You can operate your own VPN servers (e.g. based on OpenVPN) on STACKIT VMs or connect existing services. STACKIT also supports private networking for dedicated network segments without public Internet access.
VPN apps can be used to conveniently set up connections on Android, iOS, Windows or Linux. Routers and browser add-ons such as Chrome VPN clients are also supported.
A VPN encrypts all data traffic, whereas a proxy usually only routes web traffic via a server. VPNs therefore offer more comprehensive protection and better anonymity for your activities.
With STACKIT, you can create and analyze logs of connection times, data volumes or user activities - for example via Prometheus, Grafana or other monitoring tools.