close

Welcome to ELCOM internet service provider.

Where you can find all internet services that suit your business or home needs, from our belief that future depends on technology we always looking to create the latest technology with highest quality, because information technology is our world and we take all responsibility to put this world in your hands with the simplest ways.

VPN

VPN A Privacy Service You Can Trust.

If you need to encrypt and secure your internet connection—whether you're using an unsecured public Wi-Fi connection or are worried about snooping your data—a VPN service is just what you need.

A virtual private network (VPN) is a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible.

A VPN provides varying levels of security so that traffic sent through the VPN connection stays isolated from other computers on the intermediate network, either through the use of a dedicated connection from one "end" of the VPN to the other, or through encryption. VPNs can connect individual users to a remote network or connect multiple networks together.

When we talk about VPN we think about a secure connection to and from a network or a computer, the most used VPN protocols are: PPTP, L2TP, IPsec, and SSL:

· PPTP (Point-to-Point Tunneling Protocol): it’s the most widely supported VPN method among Windows users and it was created by Microsoft in association with other technology companies. The disadvantage of PPTP is that it does not provide encryption and it relies on the PPP (Point-to-Point Protocol) protocol to implement security measures. But compared to other methods, PPTP is faster and it is also available for Linux and Mac users.

· L2TP (Layer 2 Tunneling Protocol): it’s another tunneling protocol that supports VPNs.  Like PPTP, L2TP does not provide encryption and it relies on PPP protocol to do this. The difference between PPTP and L2TP is that the second one provides not only data confidentiality but also data integrity. L2TP was developed by Microsoft and Cisco as a combination between PPTP and L2F (Layer 2 Forwarding).

· IPsec protocol: can be used for encryption in correlation with L2TP tunneling protocol. It is used as a “protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream”. IPSec requires expensive, time consuming client installations and this can be considered an important disadvantage.

· SSL (Secure Socket Layer): is a VPN accessible via https over web browser. The advantage of this SSL VPN is that it doesn’t need any software installed because it uses the web browser as the client application. Through SSL VPNs the user’s access can be restrict to specific applications instead of allowing access to the whole network.

For more information please call our customer care department or our Sales department to provide you with more information regarding our VPN service
Elcom Customer Care: +963-11-5027
Elcom Sales Department: +963-11-3343301