Offsite Network Connection (VPN)


As part of their job duties, some faculty and staff members are required to work when physically away from a TWU location. With a VPN connection, the user may access any TWU information system or device available to on-campus personnel.

The VPN software is pre-loaded onto TWU-owned laptops when they are originally configured by IT Solutions staff. When necessary, an analyst or technician will install or reinstall the software onto the TWU laptop. Additionally, the Technology Service Desk will provide limited assistance to faculty and staff with the installation of the software onto their personal computers.

Why is VPN necessary?

Anywhere confidential information is transported across a computer network it needs to be protected from public access. Institutions like Texas Woman's University use several methods to secure confidential information, including firewalls, authentication, data encryption, etc. Unfortunately, some of these security technologies prevent authorized computer users from accessing the data they need if they are outside of the TWU network. A VPN helps solve remote access issues while keeping confidential data secure as it is transferred across a public network. Furthermore, a computer running TWU's VPN client appears to be connected locally to the TWU network.

Getting started

  1. Navigate to Workflow
  2. Next to New Form: click VPN Request Form.
  3. Read the User Agreement.
  4. If you will abide by the agreement, check I Agree to the Above.
  5. Click Save and Submit.
  6. Your supervisor will be notified to review your request. 
  7. Once supervisor approval is obtained, VPN access will be granted.
  8. After the request is processed, you will receive an email notification with next steps. 


Contact the Technology Service Desk at,, submit a request through the Technology Service Catalog, or submit a request by clicking Request Service on this page.

Who can use it

  • Faculty
  • Staff


There is no charge for the VPN service, however, some specialized devices (specifically mobile devices) may require the purchase of additional software.

Learn more

Policy 9.02 Information Security Access Control


Links List

We do our best to link to only the best external sites but we cannot be held responsible for the quality or accuracy of such websites.